ITGC'S Audit Planning Thru Reporting (1...
4, ba Are your ITGC audits really helping to reduce your cybersecurity risks? This CPE internal auditor training event is designed for the financial auditor and IT auditor who need to improve their practical knowledge covering information technology general controls (ITGC). The attendees are walked through the concepts and frameworks that are important to the ITGC internal audit activities in order to create an added value for their organizati...
Using Auto-Label and Uncertainty Estima...
Enterprise Data & AI is excited to host Tyler Mckean, Head of Customer Success at Superb AI and his presentation ‘Using Auto-Label and Uncertainty Estimation for Active Learning’ on Tuesday, April 26, 2022 starting at 12 PM ET! In computer vision and machine learning operations, data labeling is an essential part of the overall workflow. And for most ML teams, utilizing manual and even AI-assisted workflows for data preparation...
April 26, 2022
Organizer:
Cognilytica Location:
Webcast
2022 Emerging Technology Virtual Summit
Emerging Technologies are evolving at a faster pace than ever before, especially as the workforce pivots to a telework environment. Throughout this event, we will discuss several new and evolving technologies that are driving real change and innovation throughout the Federal Government: Drones, IOT, and VR.
April 26, 2022
Organizer:
ATARC Location:
Webcast
Cyber Vision for 2022: Defending Assets...
Warnings from the White House about potential cyber attacks by a hostile nation-state. Security risks in third-party software code. Ransomware paralyzing schools and hospitals. Phishing schemes targeting employees. Talk of cyberwar. It is a very tough time to be a cybersecurity professional. Success in this ecosystem depends on more than technical expertise and knowledge of specific attack countermeasures. Security and IT leaders need a clear...
April 26, 2022
Organizer:
FEDINSIDER Location:
Webcast
ICIT Virtual Briefing: Accelerating Mis...
Our organizations and agencies work in a wide-ranging ecosystem involving multiple missions, locations, systems, and data sources. Orchestrating a robust security program, or executing a critical mission requires leaders to consider multiple sources of data at a near-real-time pace, resulting in potential information overload or risking mission failures. Implementing analytic automation to analyze and synthesize information enables leaders to...
April 2022 AI in Government State CDO Panel
The April 2022 AI in Government is presenting ‘State CDO Panel’ on Thursday, April 21, 2022 from 11:30 AM - 1 PM ET! With the massive increase in public sector AI adoption over the last few years it’s no surprise to state and local governments are seeing benefits from these technologies. In this interactive panel of state CDO’s they will share how states are approaching technologies such as AI, machine learning, automat...
April 21, 2022
Organizer:
Cognilytica Location:
Webcast
INTERFACE Alaska 2022
WELCOME TO INTERFACE Alaska 2022! IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to needs for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations, to help educat...
Recovery at Scale: Rapid, Reliable Reco...
Cyber-attacks and other disasters pose a constant risk to the IT operations of government agencies. The damage inflicted by these disruptions range in levels of severity and leave critical data and IT investments at risk for every hour of downtime. Preparing for a potential disaster may seem extreme, but thinking ahead and creating a plan for how to respond can make all the difference. A trustworthy modern data protection solution enables agen...
April 21, 2022
Organizer:
ATARC Location:
Webcast
Relentless Modernization: The Future of...
Across the nation, counties are sprinting toward the future of digital government. They are transitioning legacy systems to the cloud for dramatic improvements in service quality and efficiency. They're redefining access to public services to simplify experiences, eliminate hassle, and reach the underserved. They are adopting zero trust architectures for enhanced security and privacy while preparing for evolving cyber threats. Identity is the...
Answer the White House Call to Action I...
In this webinar, Logan Brown, CEO at Exodus Intelligence, will explain the importance of vulnerability intelligence with the White House push to increase cyber defense, and the use of Exodus' methodology to analyze N-Day and Zero-Day threats. Exodus Intelligence employs some of the world's most advanced reverse-engineers and exploit developers to provide Government agencies the unique ability to understand, prepare, and defend against the ever...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.