Powering and Securing Federal Agencies Online
Safeguarding customer access yields better service Federal agencies have faced unprecedented demands over the past few years, as the pandemic shut down physical offices, forcing employees to work from home and requiring agencies to completely rethink how to provide services. Data breaches and accelerating ransomware attacks have harmed agencies’ operations just as they became dependent on online delivery of services. Now agencies are bei...
April 13, 2022
Organizer:
FEDINSIDER Location:
Webcast
Threat Hunting & Offensive Security: St...
Threat hunting is no easy task. Security analyst most pore through scores of data and threat intelligence and use their own familiarity with the network to create hypotheses about potential attacks and exploits. Fortunately, advancements in technology, strategy, intel-sharing and automation have improved our ability to continuously seek out indicators of compromise and proactively root out malicious actors before they can do damage. And it...
April 12-13, 2022
Organizer:
SC Media Location:
Virtual
Automating QuickBooks Invoices for Gove...
Government contractors often struggle with customer invoice creation because of the varying requirements from customer-to-customer and contract-to-contract. QuickBooks Online and Desktop provide opportunities for efficient creation of customer invoices from time and expense data. The keys to success lie in proper setup of Items for labor category and expenses, and the automated synchronization of time and expense data. We find many clients spe...
US Army Joint Munitions Command - Impro...
Registration is Closed The Joint Munitions Command strives to secure facilities, optimize quality, and performance, but it can be difficult to gain operational visibility when faced with complex processes and multitudes of systems. Splunk collects and helps you analyze IT, OT (Operational Technology), security, and business operations data on a single platform to deliver real-time insights throughout the manufacturing process. By bringing data...
2022 Data Analytics Round Tables
Discuss. Inspire. Roundtable it. Join industry experts for impactful discussions exploring cutting-edge practices and breakthrough innovations. Offered by Washington University’s Technology & Leadership Center, the Roundtable Series was created with both practitioner and senior management in mind. These events are engines for insight on the trends and challenges your company is facing. Each virtual roundtable will drill down on key a...
Nash & Gray: Demystifying Intellectual...
The Nash & Gray virtual class series provides access to two experts in Government Contracting Intellectual Property law and policy, on a monthly basis. The sessions will dive deep into important and timely issues related to IP and Data Rights for government employees and contractors. And, of course, bring your questions to the sessions.
Cybersecurity and Special Operations: T...
Global violent extremism and near-peer threats are increasing against a backdrop of U.S. DoD political polarization in Washington, D.C. It is more vital than ever to educate our political leaders.During this roundtable, attendees will: Learn about the dependence on legacy systems and process and the need for adaptation, innovation, and institutional agilityUnderstand the need to provide our nation with a balanced portfolio of capabilities to a...
Americas Healthcare Virtual Test Drive
Presenting a condensed, hands-on tour of the integrated power of Forescout to drastically reduce risk by removing security blind spots, streamlining accurate asset management and proactively combating threats, all while preserving network integrity, system uptime and patient service delivery. During the 90-minute virtual test drive, your instructor will run you through four laps to experience: Enterprise Visibility and Ransomware Response ...
April 12, 2022
Organizer:
Forescout Location:
Virtual
Remediate Security Vulnerabilities with...
The recent Log4j vulnerability proved that most security teams lack the insight to understand how they are being impacted, what issues to prioritize, and what steps to take to neutralize potential threats. There is a critical gap in vulnerability management: typing internet-exposed vulnerabilities with in-the-wild attacker activity.Introducing Exploit Intelligence from CyCognito. Developed to help security teams focus on the most critical risk...
PESA SECURA VDS - The Secure Eyes and E...
The needs of command and control now require all-domain capability across all military services on land, sea, air, space and cyberspace. Cameras, sensors, drones, IoT and other data sources from various Department of Defense organizations will converge into a network within Joint All Domain Command and Control (JADC2), in a cloud-like environment to share intelligence, surveillance and reconnaissance data across multiple communications network...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.