Back to Search Begin New Search Save Search Auto-Notify
Meeting Federal Zero Trust Standards wi...
In January, the White House released Memo M-22-09 that mandated, "Federal security teams and data teams work together to develop data categories and security rules to automatically detect and ultimately block unauthorized access to sensitive information." Simultaneously, there has been a 44% increase in workers' use of collaboration tools since 2019. To meet this changing security landscape, federal agencies and the defense industrial base mus...
August 17, 2022
Organizer: AvePoint Government Team at Carahsoft
Location: Webcast
Add Favorite
Workflow Warfare - Bringing AI to DoD's...
The Department of Defense can only transform itself as fast as its slowest workflow. At the foundation of DoD’s various warfare capabilities – including cyber, electronic, and information – is the push to transform its administrative advantage in “Workflow Warfare.” These elements of warfare are the backend processes that make a large agency run effectively and connect IT, HR, finance, procurement, workplace, and...
August 17, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Creative Procurement for Innovation
This panel will focus on bringing together federal professionals to share acquisition best practices. As many are learning in the government digital space, while modern practices and technical capabilities are the outcome, the process of modernizing starts with acquiring the services in new ways. This panel will allow acquisition specialists and leaders to share what they’re doing to transform their digital services, and the agile procur...
August 17, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Vulnerability and Patch Management: Eve...
ProxyLogon. Log4Shell. Print Nightmare – 2021 was the worst year ever for major vulnerabilities and exploits, and there’s no reason to believe the pace is slowing down. Rushed code development, third-party libraries, and a growing array of API bugs are overwhelming companies’ efforts to manage and patch vulnerabilities in their systems and devices. With that in mind, this eSummit will explore how companies can adjust their st...
August 16-17, 2022
Organizer: SC Media
Location: Virtual
Add Favorite
Detroit Cyber Security Summit
The Second Annual Detroit Cyber Security Summit returns on August 16th, In-Person at the Marriott Renaissance Center and Virtually Live-Streamed as it connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $195 each for in-person attendance, giving you access to all Interactive Panels, Discussi...
August 16, 2022
Organizer: Official Cyber Security Summit
Location: Detroit, MI
Add Favorite
Determining the Requirements for Delive...
The Nash & Gray virtual class series provides access to two experts in Government Contracting Intellectual Property law and policy, on a monthly basis. The sessions will dive deep into important and timely issues related to IP and Data Rights for government employees and contractors. And, of course, bring your questions to the sessions.
August 16, 2022
Organizer: Public Contracting Institute
Location: Webcast
Add Favorite
Strengthen Your Peoplesoft Identity and...
Join Pathlock and Carahsoft for a webinar to learn how to strengthen your PeopleSoft identity and access governance strategies with automation. Organizations are managing a daunting task to safeguard access to PeopleSoft with a constant flow of requests for user on-boarding, off-boarding, and users changing roles. Properly provisioning user access can be manual, time-consuming, and resource-draining.To ensure productivity, it is critical to ha...
August 16, 2022
Organizer: Pathlock Government Team at Carahsoft
Location: Webcast
Add Favorite
Detect Financial Fraud with Data Scienc...
Amid the rise of financial fraud in the post-pandemic world, organizations need secure, scalable, and robust methods to mitigate risks. Using SAIC's Tenjin Artificial Intelligence (AI) Platform, the highly secure Koverse Data Platform, and Tableau, stakeholders can quickly and easily gain more accurate and informative insights from complex and disparate data sources. This use case will identify predictors of fraudulent transactions, which can...
August 16, 2022
Organizer: Tableau Government Team at Carahsoft
Location: Webcast
Add Favorite
Cyber-SCRM Educational Training Series
You are invited to join the Cybersecurity Supply Chain Risk Management (C-SCRM) Acquisition Community of Practice (ACoP) on August 16 at 1p.m. EST. Since the launch of the C-SCRM ACoP, GSA and CISA have been co-leading an effort to broaden the level of awareness and develop agency maturity in the areas of acquisitions, supply chain risk management, and cybersecurity across the Federal Government for information communication technology and ser...
August 16, 2022
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Don't Get Blindsided by Mobile Gaps in...
Software Supply Chain Risk Management for Mobile Applications, from large MDM systems to only a handful of 3rd-party created apps, is a difficult undertaking. App Stores do not protect you from vulnerabilities. We can assist you in further developing your Mobile Application Risk Management program. From easily creating a Software Bill of materials for your existing mobile applications, to automating the vetting of all new releases from the app...
August 16, 2022
Organizer: NowSecure Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search