Strategizing for Better Data Sharing
Federal agencies house immense volumes of data critical to mission success — data that can improve CX, create more efficient processes and drive innovation. Fully leveraging that data, and emerging technologies like artificial intelligence, requires secure, effective data sharing. But developing a strategy that strengthens security while improving visibility and sharing is no small feat, and implementing such a strategy poses its own set...
How To Do Application Security Right in...
It's been more than a decade since Marc Andreessen popularized the idea that "every company needs to become a software company." But in 2024, just being a software company isn't enough; you need to become a secure software company. That's why Ted Harrington created a new Infosec Skills learning path based on his best-selling book, "Hackable: How to Do Application Security Right." Whether you create code, secure systems or manage organizational...
January 18, 2024
Organizer:
Infosec Location:
Webcast
Open-Source Software Security: Areas of...
Open-source software (OSS) is a key enabler of software, products, and service development, and a driver of innovation across industries, and it is more important than ever that those practicing across key industries stay abreast of the legal issues raised by OSS. Recognizing that the security and resiliency of OSS is a national security, economic, and a technology innovation imperative, the White House's Office of National Cyber Director (ONC...
Strategizing for Better Data Sharing
Federal agencies house immense volumes of data critical to mission success — data that can improve CX, create more efficient processes and drive innovation. Fully leveraging that data, and emerging technologies like artificial intelligence, requires secure, effective data sharing. But developing a strategy that strengthens security while improving visibility and sharing is no small feat, and implementing such a strategy poses its own set...
Beyond metrics: Defining Success in Clo...
Stay ahead in the digital transformation journey and uncover the secrets behind successful workload and application migration strategies in the cloud. Join moderator Jason Miller, and agency and industry leaders on Jan. 18 at 2 p.m. EST as they dive into the transformative realm of cloud strategies, mission success and cutting-edge technologies. Learning objectives: Where are agencies in the cloud today? Moving mission workloads to the cloud A...
CSA AI Summit
The Cloud Security Alliance Virtual AI Summit brings together experts from around the world to provide key insights on how generative AI can benefit cybersecurity, how malicious attackers are using it and guidelines for responsible usage. The explosive growth of ChatGPT is due in large part to its delivery via the cloud, obligating CSA and its community to take a leading role in articulating the best practices and assurance ecosystem for AI as...
Unveiling PhishTitan ICES - Protect you...
Modern threat actors use sophisticated attack methods to bypass traditional email security solutions. Email attacks have increased in sophistication and severity. As you know, it only takes one click on one dangerous link to lead to a significant compromise. In this webinar, we are thrilled to show you our new integrated cloud email security solution (ICES), PhishTitan. PhishTitan is a next-generation phishing protection and remediation soluti...
Proposal Writing And Requirement Matrix...
Proposal Writing And Requirement Matrix-To Make Your Proposal Stand Out In Government Contracting REGISTER HERE https://www.govassociation.org/event-5505097 This week’s lab is set up to help you dive deeper into the proposal process. We’ll review some key proposal techniques and breakdown a winning proposal. This is part two of a two-part proposal lab series. LAB TOPIC: Go or no-go decision process Establishing your past performanc...
Hands-On Workshop | Least Privilege - A...
Many cloud-focused tools and third-party vendors require access to your organization’s cloud account. Sure, you could open up the flood gates and allow full, administrative access, but do those vendors and tools need that level of access? Most likely, no. In an age of increased supply chain and upstream vendor compromises, we must ensure that we are limiting any and all external access to what is truly needed and nothing more. In this wo...
Dashboard in a Day - Softcrylic
Thank you for the overwhelming response. The enrollment capacity for this event has been reached. At Microsoft, we understand that in the current economic climate you are being asked to enhance your business by leveraging data to make critical business decisions in an efficient, precise and effective manner. Power BI is a business analytics service that gives you a single view of your business data, with the ability to monitor the health of yo...
January 17, 2024
Organizer:
Microsoft Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.