Back to Search Begin New Search Save Search Auto-Notify
America Under Cyber Attack: Operating i...
How to Prevent & Manage Supply Chain Risks Last year foreign hackers secretly broke into a US-based IT security solution provider and added infected code into their software. As part of the company’s regular software update process, the company unknowingly forwarded malicious code, creating a backdoor to their clients' IT systems. Multiple government agencies and private organizations were impacted. The breach caught many of the Fede...
February 23, 2021
Organizer: Digital Government Institute
Location: Webcast
Add Favorite
Splunk Workplace Insights: How to Manag...
**This event is ONLY for SLED/Security and IT roles in New Mexico, Colorado and Wyoming.** Join Splunk and Aquila to learn how organizations can leverage Splunk's Workplace Insights to provide real time insights to manage your locations. In hybrid work environments, data about onsite vs remote workers can drive regulatory, policy, and business decisions to optimize your employee health. Workplace Insights is an investigative data framework tha...
February 23, 2021
Organizer: Splunk Government Team at Carahsoft
Location: Webcast
Add Favorite
Adobe Experience Makers DHS Workshop Se...
Government agencies are rebuilding their digital experiences with citizens and employees in mind. Through innovative and reliable programs, Adobe has been assisting in these efforts by offering solutions that increase efficiency and deliver memorable experiences to citizens, all while protecting confidential data and information within the public sector.Join us for just one or all three webinars in our Department of Homeland Security workshop...
February 23, 2021
Organizer: Adobe Government Team at Carahsoft
Location: Webcast
Add Favorite
Threat Hunting Advanced Threats
As we are continually learning, supply chain attacks can be hard to detect and the damage can take months to understand. Piecing together an entire timeline of what happened, and who was involved, requires specific subject matter expertise. That’s why investigations can take days to complete without the right tools (and people) in place. However, Exabeam and VMware Carbon Black together can automate threat hunting and investigations by...
February 23, 2021
Organizer: Exabeam Government Team at Carahsoft
Location: Webcast
Add Favorite
Navigating the Sea of Overhead
Overheads, loads, add-ons, burdens, indirect costs, allocations, wraps... What do they all mean? Successful government contractors are able to navigate the sea of indirect rate complexities while complying with regulations, maintaining cost and delivering for their customer. Please join DHG's Mike Mardesich and Brad Tress as they tackle the essentials for understanding indirect costs and associated requirements. Some of the topics to be addres...
February 23, 2021
Organizer: Dixon Hughes Goodman
Location: Webcast
Add Favorite
Ohio Virtual Cybersecurity Summit
Since 1999, Data Connectors has facilitated the collaboration between cybersecurity professionals and solution providers. Today, the community is comprised of over 650,000 members and 200 active vendor partners. Members enjoy informative education from industry luminaries, innovative solution providers and government agencies such as the FBI, InfraGard, US Secret Service and the Department of Homeland Security. Data Connectors brings live conf...
February 18, 2021
Organizer: Data Connectors
Location: Virtual
Add Favorite
Finance Analytics CPE Course One - Data...
In this free one-hour webinar, you will learn about data structures and see how to visualize data. Charlie Bame-Aldred and William Goldman of Hub AE and James Lenihan of Tableau Software will share basic approaches of how and when to use analytics.
February 18, 2021
Organizer: Tableau
Location: Webcast
Add Favorite
Hybrid Threats: The Synthesis of Advanc...
Today’s most advanced nation-state adversaries, to include groups originating from within Russia, China, Iran, and North Korea, are engaged in cyber operations that blur the lines between nation-state objectives and organized crime. Whereas many nations have difficulty controlling cyber-crime originating from within their borders, the above-aforementioned nations are complicit with several major organized crime groups. Accordingly, the p...
February 18, 2021
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Managed Attribution for Online Investigations
Join Ntrepid for a live webinar that analyzes what managed attribution is, discusses how to reduce risks when operating online, and reviews the opportunities and tools available to you when conducting online research and investigation. Nfusion, Ntrepid's desktop solution provides a platform for investigators to collect information about illicit activities without risking exposure. Law enforcement agencies face numerous challenges when conducti...
February 18, 2021
Organizer: Ntrepid Government Team at Carahsoft
Location: Webcast
Add Favorite
Accelerating CI/CD Cycles with Programm...
DevOps teams have built automated, repeatable processes for much of the development pipeline. Test data bottlenecks continue to plague otherwise efficient CI/CD workflows, yet are surprisingly overlooked when evaluating the speed of the value stream. Legacy ticketing systems and coordination to provision and refresh test data create a tremendous drag on release velocity, and manual processes for de-identifying sensitive information are slow an...
February 18, 2021
Organizer: Delphix Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search