Back to Search Begin New Search Save Search Auto-Notify
Action Steps to Zero Trust in Government
Ever since the White House issued its Cybersecurity Executive Order in May 2021, a lot of attention has been paid to the concept of zero trust embedded as its core objective. But the reason to get to zero trust is to protect the data – after all, what do system intruders want? To read, or alter, or copy the data, which they can then use for their own purposes, from monetizing intellectual property to stealing someone’s identity to...
April 14, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Identity Revolution Tour
Join the Identity Revolution Tour meetup in Washington, DC to learn how your peers are starting a cybersecurity movement at their organization with converged solutions and Zero Trust frameworks. Come network with our community over delicious food and drinks — all while earning CPE credit. The game has changed. And we can no longer play by the rules that defined the last generation of Identity. The move to the cloud, Zero Trust mandates,...
April 14, 2022
Organizer: Saviynt
Location: Washington, DC
Add Favorite
Austin Cybersecurity Conference
When it comes to staying on top of your organization’s security needs, it is vital to make connections and learn from experts. Attend the Austin Cybersecurity Conference with thought leaders and luminaries to gather insights on the latest trends and threats in cybersecurity. Join this event to meet face-to-face with your fellow security professionals and solution providers, and hear from experts and industry luminaries on what it takes t...
April 13-14, 2022
Organizer: Data Connectors
Location: Austin, TX
Add Favorite
FUN with the FAR℠ Season 9
26 Bi-Weekly* Sessions from January 5, 2022 to December 14, 2022 Covering each Part of the Federal Acquisition Regulation and created to make the FAR approachable and thought provoking for contracting professionals at all levels. This training is delivered in an innovative talk-show format with PCI’s most gregarious instructor Steve Daoust as your host and a different subject matter expert each session. The Federal Acquisition Regulation...
April 13, 2022
Organizer: Public Contracting Institute
Location: Webcast
Add Favorite
Federal Insights Exchange featuring DHS...
Learn how the USCG is transforming and modernizing its fleet and IT infrastructure to better perform its missions. The US Coast Guard (USCG) has been actively pursuing an ambitious technology revolution plan to replace legacy equipment and modernize its cybersecurity and data management capabilities. Sworn to protect the American borders, the Coast Guard focused on empowering their fleet with reliable, mobile, and secure systems. Learn how the...
April 13, 2022
Organizer: ACT-IAC
Location: Webcast
Add Favorite
Zero Trust and the Power of Isolation f...
With the growing threat of cyber attacks, DHS’s Cybersecurity and Infrastructure Agency (CISA) and the White House have recently released guidelines for agencies to adopt a Zero Trust approach to cybersecurity. Isolation is paramount to Zero Trust Architecture. Isolation creates a virtual "air gap" between the network end user and the online world. Instead of opening a website directly, the end user sees a sanitized version of it with al...
April 13, 2022
Organizer: DLT Solutions | Menlo Security
Location: Webcast
Add Favorite
Powering and Securing Federal Agencies Online
Safeguarding customer access yields better service Federal agencies have faced unprecedented demands over the past few years, as the pandemic shut down physical offices, forcing employees to work from home and requiring agencies to completely rethink how to provide services. Data breaches and accelerating ransomware attacks have harmed agencies’ operations just as they became dependent on online delivery of services. Now agencies are bei...
April 13, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Threat Hunting & Offensive Security: St...
Threat hunting is no easy task. Security analyst most pore through scores of data and threat intelligence and use their own familiarity with the network to create hypotheses about potential attacks and exploits. Fortunately, advancements in technology, strategy, intel-sharing and automation have improved our ability to continuously seek out indicators of compromise and proactively root out malicious actors before they can do damage. And it...
April 12-13, 2022
Organizer: SC Media
Location: Virtual
Add Favorite
Automating QuickBooks Invoices for Gove...
Government contractors often struggle with customer invoice creation because of the varying requirements from customer-to-customer and contract-to-contract. QuickBooks Online and Desktop provide opportunities for efficient creation of customer invoices from time and expense data. The keys to success lie in proper setup of Items for labor category and expenses, and the automated synchronization of time and expense data. We find many clients spe...
April 12, 2022
Organizer: Left Brain Professionals Inc.
Location: Webcast
Add Favorite
US Army Joint Munitions Command - Impro...
Registration is Closed The Joint Munitions Command strives to secure facilities, optimize quality, and performance, but it can be difficult to gain operational visibility when faced with complex processes and multitudes of systems. Splunk collects and helps you analyze IT, OT (Operational Technology), security, and business operations data on a single platform to deliver real-time insights throughout the manufacturing process. By bringing data...
April 12, 2022
Organizer: Splunk Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search