What Does Good Cloud Security Look Like?
So, you're in the cloud... what's next? Cloud applications are at the heart of digital transformation. With their scalability, ease of operationalization, and better resource utilization, it's no wonder why enterprises are turning to the cloud. With all the benefits of cloud computing come challenges and risks, so it is critical to be able to secure the crown jewel, your data. Learn how you can ensure the security and privacy of your cloud com...
Improving Operational Transfer Pricing
Sometimes being told what profit to target is the easy part. Companies faced with the challenge of implementing transfer pricing policies often consider data availability, multiple enterprise resource planning (ERP) systems, coordination with customs, limited resources, and divergent internal viewpoints. We’ll discuss: How taking a fresh look at the people, processes, and technology involved in operationalizing your transfer pricing can...
January 26, 2023
Organizer:
Deloitte Location:
Webcast
Controllership Year In Review: Finding...
As we head into a new year, it’s the perfect time to think about our resolutions, expectations, and thoughts for 2023. What is shaping the economy? What technology trends are fueling transformation? And what should Controllers know for the year ahead? We’ll discuss: Insights on events shaping the economy, their impact on finance, and next year’s economic possibilities How technology transformation continues to play a key role...
January 26, 2023
Organizer:
Deloitte Location:
Webcast
Tactics for Web App Security Using Zero...
Zero trust architecture at its core increases cyber defenses and reduces threats to data exposure, which is more critical than ever as web applications remain a top attack vector for gaining access to sensitive systems and information; attacks on web apps increased from 31.5% in 2020 to 53.6% in 2021, according to Kapersky. Fortunately, new guidance from the Department of Defense (DoD) presents seven pillars that are critical to ZTA success ...
January 26, 2023
Organizer:
ATARC Location:
Webcast
Cybersecurity Stays Front-of-Mind in 20...
The COVID-19 pandemic forced public sector agencies across the country to rely on their IT to deliver services to customers. The “forced evolution” of systems can be seen as a long-term benefit, but it also amplified the vulnerability of communities to potentially serious cyberattacks. For instance, the threat of ransomware continues to grow as cyber criminals target managed service providers, the cloud, and the software supply cha...
January 26, 2023
Organizer:
FEDINSIDER Location:
Webcast
Firm Foundations for Better Digital Forms
The key to digital transformation is a solid foundation of usable data. Gathering, storing, and accessing information from both customers and employees can be a cumbersome task with legacy forms processes. By converting these legacy processes to adaptive digital forms, you can empower both customers and employees with a simple way to submit their data through secure online forms and increase efficiency for your organization. Adobe Experience M...
2023 National Trial Lawyers Summit
The annual Trial Lawyers Summit is a unique gathering of America's most outstanding civil plaintiff and criminal defense lawyers. Offering various networking opportunities and informative sessions, the Trial Lawyers Summit provides attorneys the chance to improve their trial skills and business management. Packed with compelling speakers, valuable conversations, exclusive social functions, and plenty of opportunities to enjoy catered meals and...
Securing Your Networks From IPv6 Threats
Securing Your Networks From IPv6 Threats The explosion of Internet-connected devices – from mobile communications to the Internet of Things – demonstrates the need for the quantum increase in available IP addresses created by moving to IPv6. This webinar, the second of four sessions, addresses the unique strengths and security challenges of IPv6. The shift to IPv6 means that end-to-end encryption is built into devices and systems,...
January 25, 2023
Organizer:
FEDINSIDER Location:
Webcast
Investigation & Threat Hunting Virtual...
The surge in advanced attackers has created a need for SecOps to understand, quickly respond to and hunt the most sophisticated threats inside your organization. Join this 3 hour hands-on investigation and threat hunting virtual workshop to boost your skills and learn how to use Cortex XDR to stop sophisticated attacks by: Creating custom rules to alert on suspicious behavior Accelerating threat hunting with enriched, contextualized data Quick...
Alliant 2 DPA Training
All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how Alliant 2 can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against Alliant 2. This webinar is not open to...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.