Meeting Federal Zero Trust Standards wi...
In January, the White House released Memo M-22-09 that mandated, "Federal security teams and data teams work together to develop data categories and security rules to automatically detect and ultimately block unauthorized access to sensitive information." Simultaneously, there has been a 44% increase in workers' use of collaboration tools since 2019. To meet this changing security landscape, federal agencies and the defense industrial base mus...
Workflow Warfare - Bringing AI to DoD's...
The Department of Defense can only transform itself as fast as its slowest workflow. At the foundation of DoD’s various warfare capabilities – including cyber, electronic, and information – is the push to transform its administrative advantage in “Workflow Warfare.” These elements of warfare are the backend processes that make a large agency run effectively and connect IT, HR, finance, procurement, workplace, and...
August 17, 2022
Organizer:
FEDINSIDER Location:
Webcast
Creative Procurement for Innovation
This panel will focus on bringing together federal professionals to share acquisition best practices. As many are learning in the government digital space, while modern practices and technical capabilities are the outcome, the process of modernizing starts with acquiring the services in new ways. This panel will allow acquisition specialists and leaders to share what they’re doing to transform their digital services, and the agile procur...
August 17, 2022
Organizer:
ATARC Location:
Webcast
Vulnerability and Patch Management: Eve...
ProxyLogon. Log4Shell. Print Nightmare – 2021 was the worst year ever for major vulnerabilities and exploits, and there’s no reason to believe the pace is slowing down. Rushed code development, third-party libraries, and a growing array of API bugs are overwhelming companies’ efforts to manage and patch vulnerabilities in their systems and devices. With that in mind, this eSummit will explore how companies can adjust their st...
August 16-17, 2022
Organizer:
SC Media Location:
Virtual
Detroit Cyber Security Summit
The Second Annual Detroit Cyber Security Summit returns on August 16th, In-Person at the Marriott Renaissance Center and Virtually Live-Streamed as it connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $195 each for in-person attendance, giving you access to all Interactive Panels, Discussi...
Determining the Requirements for Delive...
The Nash & Gray virtual class series provides access to two experts in Government Contracting Intellectual Property law and policy, on a monthly basis. The sessions will dive deep into important and timely issues related to IP and Data Rights for government employees and contractors. And, of course, bring your questions to the sessions.
Strengthen Your Peoplesoft Identity and...
Join Pathlock and Carahsoft for a webinar to learn how to strengthen your PeopleSoft identity and access governance strategies with automation. Organizations are managing a daunting task to safeguard access to PeopleSoft with a constant flow of requests for user on-boarding, off-boarding, and users changing roles. Properly provisioning user access can be manual, time-consuming, and resource-draining.To ensure productivity, it is critical to ha...
Detect Financial Fraud with Data Scienc...
Amid the rise of financial fraud in the post-pandemic world, organizations need secure, scalable, and robust methods to mitigate risks. Using SAIC's Tenjin Artificial Intelligence (AI) Platform, the highly secure Koverse Data Platform, and Tableau, stakeholders can quickly and easily gain more accurate and informative insights from complex and disparate data sources. This use case will identify predictors of fraudulent transactions, which can...
Cyber-SCRM Educational Training Series
You are invited to join the Cybersecurity Supply Chain Risk Management (C-SCRM) Acquisition Community of Practice (ACoP) on August 16 at 1p.m. EST. Since the launch of the C-SCRM ACoP, GSA and CISA have been co-leading an effort to broaden the level of awareness and develop agency maturity in the areas of acquisitions, supply chain risk management, and cybersecurity across the Federal Government for information communication technology and ser...
Don't Get Blindsided by Mobile Gaps in...
Software Supply Chain Risk Management for Mobile Applications, from large MDM systems to only a handful of 3rd-party created apps, is a difficult undertaking. App Stores do not protect you from vulnerabilities. We can assist you in further developing your Mobile Application Risk Management program. From easily creating a Software Bill of materials for your existing mobile applications, to automating the vetting of all new releases from the app...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.