Back to Search Begin New Search Save Search Auto-Notify
Threat Hunting & Offensive Security: St...
Threat hunting is no easy task. Security analyst most pore through scores of data and threat intelligence and use their own familiarity with the network to create hypotheses about potential attacks and exploits. Fortunately, advancements in technology, strategy, intel-sharing and automation have improved our ability to continuously seek out indicators of compromise and proactively root out malicious actors before they can do damage. And it...
April 12-13, 2022
Organizer: SC Media
Location: Virtual
Add Favorite
Automating QuickBooks Invoices for Gove...
Government contractors often struggle with customer invoice creation because of the varying requirements from customer-to-customer and contract-to-contract. QuickBooks Online and Desktop provide opportunities for efficient creation of customer invoices from time and expense data. The keys to success lie in proper setup of Items for labor category and expenses, and the automated synchronization of time and expense data. We find many clients spe...
April 12, 2022
Organizer: Left Brain Professionals Inc.
Location: Webcast
Add Favorite
US Army Joint Munitions Command - Impro...
Registration is Closed The Joint Munitions Command strives to secure facilities, optimize quality, and performance, but it can be difficult to gain operational visibility when faced with complex processes and multitudes of systems. Splunk collects and helps you analyze IT, OT (Operational Technology), security, and business operations data on a single platform to deliver real-time insights throughout the manufacturing process. By bringing data...
April 12, 2022
Organizer: Splunk Government Team at Carahsoft
Location: Webcast
Add Favorite
2022 Data Analytics Round Tables
Discuss. Inspire. Roundtable it. Join industry experts for impactful discussions exploring cutting-edge practices and breakthrough innovations. Offered by Washington University’s Technology & Leadership Center, the Roundtable Series was created with both practitioner and senior management in mind. These events are engines for insight on the trends and challenges your company is facing. Each virtual roundtable will drill down on key a...
April 12, 2022
Organizer: WashU Technology & Leadership Center
Location: St. Louis, MO
Add Favorite
Nash & Gray: Demystifying Intellectual...
The Nash & Gray virtual class series provides access to two experts in Government Contracting Intellectual Property law and policy, on a monthly basis. The sessions will dive deep into important and timely issues related to IP and Data Rights for government employees and contractors. And, of course, bring your questions to the sessions.
April 12, 2022
Organizer: Public Contracting Institute
Location: Webcast
Add Favorite
Cybersecurity and Special Operations: T...
Global violent extremism and near-peer threats are increasing against a backdrop of U.S. DoD political polarization in Washington, D.C. It is more vital than ever to educate our political leaders.During this roundtable, attendees will: Learn about the dependence on legacy systems and process and the need for adaptation, innovation, and institutional agilityUnderstand the need to provide our nation with a balanced portfolio of capabilities to a...
April 12, 2022
Organizer: NetAbstraction Government Team at Carahsoft
Location: Reston, VA
Add Favorite
Americas Healthcare Virtual Test Drive
Presenting a condensed, hands-on tour of the integrated power of Forescout to drastically reduce risk by removing security blind spots, streamlining accurate asset management and proactively combating threats, all while preserving network integrity, system uptime and patient service delivery. During the 90-minute virtual test drive, your instructor will run you through four laps to experience: Enterprise Visibility and Ransomware Response ...
April 12, 2022
Organizer: Forescout
Location: Virtual
Add Favorite
Remediate Security Vulnerabilities with...
The recent Log4j vulnerability proved that most security teams lack the insight to understand how they are being impacted, what issues to prioritize, and what steps to take to neutralize potential threats. There is a critical gap in vulnerability management: typing internet-exposed vulnerabilities with in-the-wild attacker activity.Introducing Exploit Intelligence from CyCognito. Developed to help security teams focus on the most critical risk...
April 12, 2022
Organizer: CyCognito Government Team at Carahsoft
Location: Webcast
Add Favorite
PESA SECURA VDS - The Secure Eyes and E...
The needs of command and control now require all-domain capability across all military services on land, sea, air, space and cyberspace. Cameras, sensors, drones, IoT and other data sources from various Department of Defense organizations will converge into a network within Joint All Domain Command and Control (JADC2), in a cloud-like environment to share intelligence, surveillance and reconnaissance data across multiple communications network...
April 12, 2022
Organizer: AFCEA | Signal Webinar Series
Location: Webcast
Add Favorite
Protecting Healthcare's Essential Data...
Last year, the U.S. healthcare system faced unimaginable demands created by the pandemic. Unfortunately, 2021 also was a banner year for healthcare data breaches – more than 40 million individuals’ health records were exposed. Nor are the cyber threats limited to personal records. Ransomware attacks locked down and encrypted hospitals’ and health departments’ data, and the Food and Drug Administration issued a Class I r...
April 12, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search