Introduction to Advanced Analytics with...
Join Alteryx for an interactive session on conducting end-to-end analysis. To start off, we will unpack how federal, state, and local agencies are utilizing data driven approaches to enhance their operations, including reconciliation, risk assessment, and data deduplication. After a brief introduction to the possibilities, you'll go hands-on and learn how to apply these techniques for yourself. You will learn how to bring in and merge differe...
DevSecOps: A Shift Left for Security an...
The success of federal agencies hinges on modernization. As such, a growing number of government programs are adopting DevSecOps methodologies but struggle to harness its full potential. With Atlassian's Jira Software and Confluence, agencies can make the most of their adoption by streamlining workflows and boosting agility. Join Atlassian experts on November 15th to explore: Use cases on federal agencies modernizing their systems using A...
Leveraging Delinea Server PAM for Smart...
Smart cards provide an enhanced level of security for Linux computers when users log on to Active Directory domains. If you use a smart card to log on, authentication requires a valid and trusted root certificate or intermediate root certificate that can be validated by a known and trusted certification authority (CA). Because smart cards rely on a public-private key infrastructure (PKI) to sign and encrypt certificates and validate that the c...
The Industry's First Unified Observabil...
Join Riverbed and Carahsoft for a live webinar that breaks down how organizations can keep pace with modernization initiatives and technology advancements. By taking a step back and evaluating your IT infrastructure, you can achieve Unified Observability. During this webinar, Riverbed's VP of Americas West, Charlie Bollom, will explain: The different levels of IT maturity along the Unified Observability Journey The difference between reactive,...
Avoiding Log4j Vulnerabilities: Securin...
Most of today's government organizations operate using proprietary or "first-party" software. These proprietary applications (ie. GOTS tools) present a challenge as they receive limited support from off-the-shelf security platforms, which leaves organizations more vulnerable to hidden vulnerabilities within their custom solutions. Join Qualys on November 29th for a live webinar where you will learn: How enhancements will allow customers to cre...
CTO Sessions: A Guide to BYOK and HYOK...
Cloud Security Alliance best practices require that keys be stored and managed outside of the cloud service provider and the associated encryption operations. Cloud Service Providers therefore offer Bring Your Own Key (BYOK) or Hold Your Own Key (HYOK) services to enable customer control of the keys used to encrypt their data. Customer control of the keys allows for the separation, creation, ownership and control, including revocation, of encr...
CTO SESSIONS: Everything You Need to Kn...
Without secure, enterprise-managed identity systems, adversaries can take over user accounts and gain a foothold in an agency to steal data or launch attacks. The Federal Zero Trust Strategy prioritizes defense against sophisticated phishing and directs agencies to consolidate identity systems so that protections and monitoring can be consistently applied. Multi-factor authentication (MFA) plays a critical part of the Government’s strat...
Transparency and Accountability: Buildi...
Trust and legitimacy, perceived and real, are as important to the delivery of police service as the ability to clear calls. Modern Evidence-Based Policing (EBP) services have embraced open data and accountable business intelligence systems as critical to these goals. The act of being transparent is important but the ability to invite the community to a conversation supported by a shared understanding of the problem, is the key to democratic po...
Embracing A Data-Driven Approach To Cyb...
Understanding what devices exist in your environment is the foundation to security. Identify compliance gaps and risks for all IP connected assets regardless of if they are managed or unmanaged. Where are you today with your Asset Management mission? Allow Armis to provide you real-time visibility and control over every asset connected to your network. The overview of the platform focused on: Discovering and managing an accurate, unified and c...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.