Evolving Talent Management to Build the...
The skills needed within the federal workforce are evolving, and the way we recruit, train, and support employees must change to support workforce and mission needs. Attendees joined us for a discussion on how to successfully support skills-based hiring and employee career growth by using ServiceNow to capture and maintain skills for re-skilling and up-skilling. The conversation started with ServiceNow experts discussing today’s ever-cha...
SAS Viya on Red Hat OpenShift: Analytic...
Red Hat and SAS hosted a webinar on Thursday, August 22nd, for insights on how their integrated solution helps enterprise IT organizations build and scale analytics on a stable infrastructure and operationalize analytics to get models into production quickly.For more information on Red Hat & SAS's collaboration, please view the resources below:Solutions Brief: Analytics in the Hybrid CloudWebsite: Trusted Decisions With SAS Viya on Red Hat...
Cryptography Simplified: Addressing the...
Cryptography is everywhere. As a key security control that enables privacy, security, and trust in our digital world, it is highly regulated. Yet, after years of being a somewhat sleepy topic in the cybersecurity world, cryptography is now a hot topic in the Public Sector for at least two reasons. First, ongoing migration from FIPS 140-2 to FIPS 140-3 is generating waves of activity to comply with the new NIST standard. As an even larger chall...
GovCon - Summer Shorts - M&A
COMPLIMENTARY + RECORDED WEBINAR SERIES Join Jennifer Schaus & Associates in this 2 WEEK Special Webinar Series, 2024. Guest Speakers will cover various topics in federal contracting and touch on three main areas:Best Practices - Avoiding Pitfalls - FAQ's - and then take your live questions. COMPLIMENTARY & RECORDED WEBINAR SERIES Tell a friend or colleague!
Securing the Gateway: Mastering API Sec...
In this session, MuleSoft discussed the importance of securing APIs and shared practical tips and strategies for keeping your APIs safe from cyber threats. Attendees gained insights into industry-leading practices and recommendations to safeguard their APIs from unauthorized access and other potential risks to securely scale their API catalog through standardization, community, and monitoring. watch the on-demand recording to learn about ways...
Value Streams in the Atlassian Ecosystem
Process inefficiencies and communication barriers hinder government agencies from delivering effective public services. As data complexity increases, visibility delays will only worsen. In Atlassian's webinar on August 27th audiences discovered possible delays in their workflows by exploring topics such as:Enhancing operational efficiency with data integrationData security and privacy in public sector analyticsBest suited tools to streamline w...
A Proactive Approach to Defend Your Endpoints
90% of organizations experienced at least one identity-related security incident in the past year. Attackers are increasingly targeting identities and exploiting privileged access to gain a strong position in your environment, bypassing the work of EDR and traditional endpoint defenses. How can security teams take a proactive approach to defending their endpoints? Watch the on-demand recording for a Tech Talk and Live Demo to learn why managin...
Carahsoft's CMMC Webinar Series - CMMC...
Wiz and Carahost hosted a webinar which covered an introduction to Cloud Native Application Protection Platform (CNAPP) and alignment with key CMMC controls. In this webinar we covered:The importance of DIB cybersecurity and safeguarding cloud workloads supporting the DIB, government agencies and warfightersBridging the divide between DIB security professionals and software developersWiz mapping & alignment with the key CMMC controls Minim...
Extending Microsoft Collaboration ABAC...
The defense industrial base (DIB) must meet the critical controls laid out CMMC, NIST, DFARS and other government mandates to bid on defense contracts and protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). Watch this on-demand webinar as we explore how extending a Zero Trust approach to file access and sharing using archTIS’s NC Protect helps to ensure compliance with various standards for secure ac...
AWS Cloud Practitioner Boot Camp
During this virtual boot camp, subject matter experts reviewed:What the AWS Cloud Platform is and the global infrastructure it providesBasic AWS Cloud architectural principlesThe AWS Cloud value propositionKey services on the AWS platform and their common use casesBasic security and compliance aspects of the AWS platform and the Shared Responsibility ModelThe billing, account management, and pricing modelsSources of documentation or technical...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.