Self Service Infrastructure with HashiC...
HashiCorp Terraform provides infrastructure automation with workflows to build composition, collaboration and reuse of infrastructure as code (IaC) while providing standardization for security, compliance and management. The extensibility allows for integration with workflows to drive innovation with self-service workflows. HashiCorp Terraform and ServiceNow provide federal agencies the freedom to leverage applications and services in a way th...
ServiceNow Federal Forum Transformation...
We’re creating great citizen and employee experiences. We’re revolutionizing high-impact services with intuitive automation and together – we’re accelerating our country’s digital evolution. It’s transformation reimagined. At the ServiceNow Federal Forum, explore how Federal innovators are connecting people, processes, and technology to innovate at scale, deliver value faster, and simply work better.
March 13, 2023
Organizer:
MeriTalk Location:
Washington, DC
Engage Audiences Across Screens with Po...
Utilize Vast Asset Libraries to Turn Inspiration Into Creation Creative professionals today are constantly innovating and collaborating with teams and colleagues to find the best way to communicate effectively, but how can they ensure that their messaging will be engaging, informative, and available to all members of their target audience? As our digital spaces become more visual, agencies must rely on digital assets such as graphics, images,...
Huntsville Cyber Security Summit
The Inaugural Huntsville Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $195 each, giving you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception. Top 8 Reasons to Attend the Cyber Security Summit Learn - Our conferences...
Detroit Cybersecurity Conference
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizatio...
March 9, 2023
Organizer:
FutureCon Location:
Southfield, MI
Risk Management: A Group Effort
Our digital world is more expansive than ever before, giving access to unprecedented capabilities for our business, government, and personal use. As digital transformation accelerates, the risks associated with cyberattacks grow and affect every aspect of modern business, from customer service to government operations to smart infrastructure. Cyber or Business resilience must be a critical component of all security strategies — yet it i...
March 9, 2023
Organizer:
ATARC Location:
Webcast
Love, Lies & Billions Lost: Eliminating...
Every year, federal agencies dispense hundreds of billions of dollars in grants, loans, disaster relief, tax refunds, disability payments, insurance claims, pensions, and more. But the financial fraud, waste, and misuse of these program funds have resulted in billions lost along with diminishing citizen trust. To avoid the loss of "citizen love," agencies must stay ahead of fraudsters with a scalable, connected, and real-time technology that s...
Deception Strategy in Zero Trust Environments
A zero trust architecture (ZTA) is an enterprise cybersecurity architecture that is based on zero trust principles and designed to prevent data breaches and limit internal lateral movement. In a zero trust environment, identity stores are a primary attack surface where any compromise of identity can create significant risk. Endpoints and any credentials they contain are also a persistent source of risk; when an adversary escalates privileges a...
PWS, SOO, SOW - Finding the Best Fit
Do you know the difference between a Statement of Work (SOW), a Performance Work Statement (PWS) and a Statement of Objectives (SOO)? How do you decide which to use, especially as it relates to professional services acquisitions? Join our experts to learn about the pros and cons of each, along with some examples and lessons learned from using each option. Earn 1 CLP! A SOW is typically used when the task is well-known and can be described in s...
The Future of FedRAMP: Reach Your Secur...
The FedRAMP Authorization Act becoming law is a promising development for government agencies prioritizing security to reimagine old processes, workflows, and experiences. FedRAMP’s codification provides government agencies with easier access to advanced security solutions that enable agility and flexibility to meet their modernization goals. Join our complimentary webinar to learn more about the FedRAMP Moderate authorization and see ho...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.