Empower YOUR Business - How recent brea...
Danyetta Fleming Magana, CEO of Covenant Security Solutions and Janice D. Pryor, Director of CyberSecurity Training for Covenant discuss the latest trends in CyberSecurity including lessons learned and future impact of the OPM and Ashley Madison Breaches among others. Learn how these high profile breaches are affecting regulators and lawmakers and ultimately your business. Tune in to learn what you can do today to prepare your CyberSecurity po...
TechLeader.TV with California State Aud...
TechLeader.TV Host John Thomas Flynn, former CIO for California and Massachusetts, and President of NASCIO, will interview State Auditor Elaine Howle. Topics will include the various audit reports critical of the State of California's management of its $5 bilion annual IT investment.
Joint Critical Infrastruture Partnershi...
This webinar series, coordinated by the DHS Office of Infrastructure Protection, is co-sponsored by InfraGard, private-industry-focused Regional Consortium Coordinating Council (RC3), and the State/Local, Tribal, Territorial Government Coordinating Council (SLTTGCC). Each hour-long Webinar session is designed to assist critical infrastructure owners and operators, physical security and information security professionals, Chief Information Off...
The Ins and Outs of Risk-Based Authenti...
Traditional ways of securing access to applications have failed. In light of the recent news around identity theft and data breaches, it is obvious that a username and password are not enough. Join TransUnion and Ping Identity for a 30-minute webcast to hear how to put the identities of your internal and external end users at the center of securing access to your applications. Attendees of this webcast will learn about: Proven identity-managem...
Detect Advanced Threats with Behavioral...
Behavioral analytics is a new approach to threat detection that uses advanced machine learning and probabilistic math to identify the anomalous actions unique to both outsider and insider attempts to steal sensitive data. Early deployments in the field show this method to be highly effective.View our on-demand webcast to hear data scientist Stephan Jou, CTO of Interset, discuss how behavioral analytics is a game changer when it comes to detect...
VMware vCloud Government Service: Benef...
VMware vCloud Government Service hosted by Carpathia is an enterprise-class hybrid service that delivers the tested and proven VMware technology used widely by every executive and cabinet level federal agency today, with the added security and compliance assurance of FedRAMP authorization. VMware vCloud Government Service gives customers the ability to run applications securely with data mobility, and enables federal agencies to utilize both n...
Manage Supply Chain Risk and Safeguard...
As sensitive information continues to increase in volume, so do potential threats to information security. This data can be found essentially anywhere, including laptops, smartphones, tablets, removable media, and cloud storage. Organizations must consider security at every step in the content lifecycle to help ensure that all information remains safe, and to achieve compliance with federal regulations. Join us on Tuesday, August 11th to learn...
Simplify and Streamline Data Transfer b...
Big Data is a collection of data sets so large and complex that it becomes difficult to process using existing database management tools or traditional data processing applications. This influx of data sets also brings the challenges of capture, curation, storage, analysis, and visualization along with it. As organizations work with an increasing number of agencies, the size of the data being exchanged increases in terabytes or exabytes. Toget...
Combat Unsafe Activities Occurring in S...
Most school systems already have personnel and systemic remedies in place to overcome bullying/cyberbullying, drugs, fights, sexual improprieties, and other unsafe activities that infect their schools. However, programs, like anti-bullying campaigns, lack the ability to gain the knowledge needed to combat these events prior to occurrence, and even to record and recover information afterwards. View our complimentary on-demand webinar to learn h...
IBM Secure Data Exchange Webinar
Protect Against Data Breaches with IBM Sterling Secure ProxyMore Than Just Your General Proxy The need to protect your agency from security breaches is at an all-time high, and the average cost of a single breach in the US is roughly $6.53 million. With this increasing risk, we are being forced to implement stricter government security requirements. We invite you to join us for a complimentary webinar where Jatinder Grewal, IBM North American...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.