Back to Search Begin New Search Save Search Auto-Notify
5 Steps Federal Agencies Should Take to...
Vulnerability management has become an increasingly complicated security challenge for Federal agencies to tackle with the increase in vulnerabilities and acceleration of cloud adoption. Agencies are driven to follow Federal guidelines such as CISA BOD 22-01 and guidance included in the recent Cyber Safety Review Board report on Log4j. Join Nucleus Security's Co-Founders, CEO Steve Carter and CTO Scott Kuffer, as they go through the five pract...
October 13, 2022
Organizer: Nucleus Security Government Team at Carahsoft
Location: Webcast
Add Favorite
Orchestrating Containers on AWS with Red Hat
Red Hat OpenShift Service on AWS (ROSA) is a turnkey application platform that provides a fully managed Red Hat OpenShift foundation for self-service, hybrid cloud deployments operated on AWS.ROSA abstracts patching, version upgrades and clusters can be deployed in minutes with the push of a button - allowing you to quickly build and manage Kubernetes applications on the industry's most comprehensive application platform.Join Red Hat experts f...
October 13, 2022
Organizer: Red Hat Government Team at Carahsoft
Location: Webcast
Add Favorite
Data Driving Customer Service
There’s a full-court press to change the way agencies deliver services to citizens. Agencies need to rethink how they design, deliver and secure services, they need to find the right balance of making sure services are easy to use, but still secure as a way to improve citizen trust as they interact and transact with the government. During this exclusive webinar, moderator Jason Miller will discuss how data-driven insights and automation...
October 13, 2022
Organizer: Federal News Network
Location: Webcast
Add Favorite
ACAMS Las Vegas Conference
As if 2021 wasn’t challenging enough, 2022 has tested AML and Anti-Financial Crime professionals like never before — a trend certain to continue. From expansive sanctions following Russia’s Ukraine invasion, to the explorable rise of FinTech and crypto, to shifting regulatory demands such as FinCEN’s national priorities, today’s AML requires new knowledge, new strategies — and constant reinvention. The ACAMS...
October 11-13, 2022
Organizer: ACAMS
Location: Las Vegas, NV
Add Favorite
Business Development Masterclass
BUILD TRUST AND CUSTOMER AFFINITY WITH EMOTIONAL INTELLIGENCE Whether you’re new to business development, you’re in a capture or supporting role, or you’re a seasoned professional, this course is for you. You will learn how to differentiate yourself by creating meaningful connections with customers and stakeholders. Secure Your Seat If You Are: Concerned about being perceived as “that” salesperson, a beltway band...
October 4-13, 2022
Organizer: Hi-Q Group LLC
Location: Virtual
Add Favorite
FUN with the FAR; Season 9
26 Bi-Weekly* Sessions from January 5, 2022 to December 14, 2022 Covering each Part of the Federal Acquisition Regulation and created to make the FAR approachable and thought provoking for contracting professionals at all levels. This training is delivered in an innovative talk-show format with PCI’s most gregarious instructor Steve Daoust as your host and a different subject matter expert each session. The Federal Acquisition Regulation...
October 12, 2022
Organizer: Public Contracting Institute
Location: Webcast
Add Favorite
Cybersecurity Summit and U.S. Cyber Cha...
Building the Cyber Environs: Tools, Technology and Workforce The shift to digital, cloud, AI and other technologies has given rise to a variety of cyberattacks with an alarming cost. Government and industry continue to face critical security and risk issues with increased cyber threats, supply chain and cloud vulnerabilities, ransomware, phising, stolen credentials and identities, new sophisticated attack approaches and other cyber-types of at...
October 12, 2022
Organizer: ACT-IAC
Location: Washington, DC
Add Favorite
ICIT Virtual Briefing: Software Supply...
ICIT Virtual Briefing: Software Supply Chain Security – Balancing Internal Orchestration with Attack Vectors Along with security controls and AppSec policies, the way you and your teams treat the software you build over time impacts the speed at which you can react to a threat. The truth is that open source software (OSS) is often treated as if it isn’t a security problem—until it is. The log4j vulnerability and the subsequen...
October 12, 2022
Organizer: Institute for Critical Infrastructure Technology
Location: Webcast
Add Favorite
OptivCon Indianapolis
As an OptivCon attendee, you can expect 8 hours of intriguing content aligned with the current cybersecurity landscape, actionable takeaways from industry leaders and multiple opportunities throughout the day to connect with those leaders personally. OptivCons are intimate events of (100 – 300) attendees, technology sponsors, your local Optiv team, and Optiv leadership. We offer a safe space for questions, deep conversations, and the ind...
October 12, 2022
Organizer: Optiv
Location: Indianapolis, IN
Add Favorite
FCW Workshop: Digital Transformation
True digital transformation is on the cusp of a watershed moment as more agencies embrace digital services and policymakers back their initiatives with guidance and money, such as the executive order on customer experience and Technology Modernization Fund respectively. Following the quick pivot to digital services during the pandemic, the momentum around digital transformation has continued with strategic efforts to more closely align governm...
October 12, 2022
Organizer: GovExec 360
Location: Virtual
Add Favorite
Back to Search Begin New Search