Back to Search Begin New Search Save Search Auto-Notify
Vulnerability and Patch Management: Eve...
ProxyLogon. Log4Shell. Print Nightmare – 2021 was the worst year ever for major vulnerabilities and exploits, and there’s no reason to believe the pace is slowing down. Rushed code development, third-party libraries, and a growing array of API bugs are overwhelming companies’ efforts to manage and patch vulnerabilities in their systems and devices. With that in mind, this eSummit will explore how companies can adjust their st...
August 16-17, 2022
Organizer: SC Media
Location: Virtual
Add Favorite
Detroit Cyber Security Summit
The Second Annual Detroit Cyber Security Summit returns on August 16th, In-Person at the Marriott Renaissance Center and Virtually Live-Streamed as it connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $195 each for in-person attendance, giving you access to all Interactive Panels, Discussi...
August 16, 2022
Organizer: Official Cyber Security Summit
Location: Detroit, MI
Add Favorite
Determining the Requirements for Delive...
The Nash & Gray virtual class series provides access to two experts in Government Contracting Intellectual Property law and policy, on a monthly basis. The sessions will dive deep into important and timely issues related to IP and Data Rights for government employees and contractors. And, of course, bring your questions to the sessions.
August 16, 2022
Organizer: Public Contracting Institute
Location: Webcast
Add Favorite
Strengthen Your Peoplesoft Identity and...
Join Pathlock and Carahsoft for a webinar to learn how to strengthen your PeopleSoft identity and access governance strategies with automation. Organizations are managing a daunting task to safeguard access to PeopleSoft with a constant flow of requests for user on-boarding, off-boarding, and users changing roles. Properly provisioning user access can be manual, time-consuming, and resource-draining.To ensure productivity, it is critical to ha...
August 16, 2022
Organizer: Pathlock Government Team at Carahsoft
Location: Webcast
Add Favorite
Detect Financial Fraud with Data Scienc...
Amid the rise of financial fraud in the post-pandemic world, organizations need secure, scalable, and robust methods to mitigate risks. Using SAIC's Tenjin Artificial Intelligence (AI) Platform, the highly secure Koverse Data Platform, and Tableau, stakeholders can quickly and easily gain more accurate and informative insights from complex and disparate data sources. This use case will identify predictors of fraudulent transactions, which can...
August 16, 2022
Organizer: Tableau Government Team at Carahsoft
Location: Webcast
Add Favorite
Cyber-SCRM Educational Training Series
You are invited to join the Cybersecurity Supply Chain Risk Management (C-SCRM) Acquisition Community of Practice (ACoP) on August 16 at 1p.m. EST. Since the launch of the C-SCRM ACoP, GSA and CISA have been co-leading an effort to broaden the level of awareness and develop agency maturity in the areas of acquisitions, supply chain risk management, and cybersecurity across the Federal Government for information communication technology and ser...
August 16, 2022
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Don't Get Blindsided by Mobile Gaps in...
Software Supply Chain Risk Management for Mobile Applications, from large MDM systems to only a handful of 3rd-party created apps, is a difficult undertaking. App Stores do not protect you from vulnerabilities. We can assist you in further developing your Mobile Application Risk Management program. From easily creating a Software Bill of materials for your existing mobile applications, to automating the vetting of all new releases from the app...
August 16, 2022
Organizer: NowSecure Government Team at Carahsoft
Location: Webcast
Add Favorite
Solving STIGs and Automating Compliance...
Federal security professionals within the DoD must comply with the technical testing and hardening frameworks known as STIGs -- Security Technical Implementation Guides. STIGs contain technical guidance for "locking down" or "hardening" information systems and software that might be vulnerable to a malicious computer attack.While security is perhaps the single most important task federal IT professionals tackle, it's also the most complex. The...
August 16, 2022
Organizer: Splunk Government Team at Carahsoft
Location: Webcast
Add Favorite
PSHC Spotlight: Contract Closeouts
Timely contract closeout process has been identified as a government-wide issue. Closing contracts in a timely manner can help to limit the government’s exposure to risks by identifying and recovering improper payments to contractors and avoiding paying interest fees when the government does not pay contractors on time. Timely closeout also ensures that the government deobligates and uses unspent funds from completed contracts before th...
August 16, 2022
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Analytic Automation and Mission Outcomes
The mission outcome driven mindset has enabled public sector agencies to recognize opportunities for applying automation and embark on pilot projects to deliver quick value against key challenges while improving accuracy and speed.Join Alteryx on August 16th to learn more about analytics automation and mission outcomes. During this Alteryx lunch and learn, attendees will learn how to: Combine analytic automation from Alteryx and RPA to deliver...
August 16, 2022
Organizer: Alteryx Government Team at Carahsoft
Location: Orlando, FL
Add Favorite
Back to Search Begin New Search