America Under Cyber Attack: Operating i...
How to Prevent & Manage Supply Chain Risks Last year foreign hackers secretly broke into a US-based IT security solution provider and added infected code into their software. As part of the company’s regular software update process, the company unknowingly forwarded malicious code, creating a backdoor to their clients' IT systems. Multiple government agencies and private organizations were impacted. The breach caught many of the Fede...
Splunk Workplace Insights: How to Manag...
**This event is ONLY for SLED/Security and IT roles in New Mexico, Colorado and Wyoming.** Join Splunk and Aquila to learn how organizations can leverage Splunk's Workplace Insights to provide real time insights to manage your locations. In hybrid work environments, data about onsite vs remote workers can drive regulatory, policy, and business decisions to optimize your employee health. Workplace Insights is an investigative data framework tha...
Adobe Experience Makers DHS Workshop Se...
Government agencies are rebuilding their digital experiences with citizens and employees in mind. Through innovative and reliable programs, Adobe has been assisting in these efforts by offering solutions that increase efficiency and deliver memorable experiences to citizens, all while protecting confidential data and information within the public sector.Join us for just one or all three webinars in our Department of Homeland Security workshop...
Threat Hunting Advanced Threats
As we are continually learning, supply chain attacks can be hard to detect and the damage can take months to understand. Piecing together an entire timeline of what happened, and who was involved, requires specific subject matter expertise. That’s why investigations can take days to complete without the right tools (and people) in place. However, Exabeam and VMware Carbon Black together can automate threat hunting and investigations by...
Navigating the Sea of Overhead
Overheads, loads, add-ons, burdens, indirect costs, allocations, wraps... What do they all mean? Successful government contractors are able to navigate the sea of indirect rate complexities while complying with regulations, maintaining cost and delivering for their customer. Please join DHG's Mike Mardesich and Brad Tress as they tackle the essentials for understanding indirect costs and associated requirements. Some of the topics to be addres...
Ohio Virtual Cybersecurity Summit
Since 1999, Data Connectors has facilitated the collaboration between cybersecurity professionals and solution providers. Today, the community is comprised of over 650,000 members and 200 active vendor partners. Members enjoy informative education from industry luminaries, innovative solution providers and government agencies such as the FBI, InfraGard, US Secret Service and the Department of Homeland Security. Data Connectors brings live conf...
Finance Analytics CPE Course One - Data...
In this free one-hour webinar, you will learn about data structures and see how to visualize data. Charlie Bame-Aldred and William Goldman of Hub AE and James Lenihan of Tableau Software will share basic approaches of how and when to use analytics.
February 18, 2021
Organizer:
Tableau Location:
Webcast
Hybrid Threats: The Synthesis of Advanc...
Today’s most advanced nation-state adversaries, to include groups originating from within Russia, China, Iran, and North Korea, are engaged in cyber operations that blur the lines between nation-state objectives and organized crime. Whereas many nations have difficulty controlling cyber-crime originating from within their borders, the above-aforementioned nations are complicit with several major organized crime groups. Accordingly, the p...
Managed Attribution for Online Investigations
Join Ntrepid for a live webinar that analyzes what managed attribution is, discusses how to reduce risks when operating online, and reviews the opportunities and tools available to you when conducting online research and investigation. Nfusion, Ntrepid's desktop solution provides a platform for investigators to collect information about illicit activities without risking exposure. Law enforcement agencies face numerous challenges when conducti...
Accelerating CI/CD Cycles with Programm...
DevOps teams have built automated, repeatable processes for much of the development pipeline. Test data bottlenecks continue to plague otherwise efficient CI/CD workflows, yet are surprisingly overlooked when evaluating the speed of the value stream. Legacy ticketing systems and coordination to provision and refresh test data create a tremendous drag on release velocity, and manual processes for de-identifying sensitive information are slow an...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.