Avoiding Log4j Vulnerabilities: Securin...
Most of today's government organizations operate using proprietary or "first-party" software. These proprietary applications (ie. GOTS tools) present a challenge as they receive limited support from off-the-shelf security platforms, which leaves organizations more vulnerable to hidden vulnerabilities within their custom solutions. Join Qualys on November 29th for a live webinar where you will learn: How enhancements will allow customers to cre...
CTO Sessions: A Guide to BYOK and HYOK...
Cloud Security Alliance best practices require that keys be stored and managed outside of the cloud service provider and the associated encryption operations. Cloud Service Providers therefore offer Bring Your Own Key (BYOK) or Hold Your Own Key (HYOK) services to enable customer control of the keys used to encrypt their data. Customer control of the keys allows for the separation, creation, ownership and control, including revocation, of encr...
CTO SESSIONS: Everything You Need to Kn...
Without secure, enterprise-managed identity systems, adversaries can take over user accounts and gain a foothold in an agency to steal data or launch attacks. The Federal Zero Trust Strategy prioritizes defense against sophisticated phishing and directs agencies to consolidate identity systems so that protections and monitoring can be consistently applied. Multi-factor authentication (MFA) plays a critical part of the Government’s strat...
Transparency and Accountability: Buildi...
Trust and legitimacy, perceived and real, are as important to the delivery of police service as the ability to clear calls. Modern Evidence-Based Policing (EBP) services have embraced open data and accountable business intelligence systems as critical to these goals. The act of being transparent is important but the ability to invite the community to a conversation supported by a shared understanding of the problem, is the key to democratic po...
Embracing A Data-Driven Approach To Cyb...
Understanding what devices exist in your environment is the foundation to security. Identify compliance gaps and risks for all IP connected assets regardless of if they are managed or unmanaged. Where are you today with your Asset Management mission? Allow Armis to provide you real-time visibility and control over every asset connected to your network. The overview of the platform focused on: Discovering and managing an accurate, unified and c...
Bridging the Gap: WIFI on School Buses
Register today for Fortinet's E-Rate webinar where our IT Education experts will discuss a groundbreaking announcement from the FCC. WIFI on school buses is now E-Rate funding eligible, and your partners at Fortinet are here to guide you through the opportunities this presents for your school. Fortinet’s IT Education experts are dedicated to helping your organization access crucial funding, enhancing, and safeguarding your technology inf...
Atlassian Team Tour: Government 2024
Atlassian is transforming government teamwork with tailored solutions to meet your agency's security and compliance needs. Enhance service delivery, responsiveness and mission success with insights from this year’s Team Tour: Government which was hosted on March 6, 2024 in Washington, D.C. Access all recordings on-demand, including keynotes and breakout sessions, and discover: Actionable tips to break down silos so your teams can increas...
Protecting the 2024 Election: Be Prepar...
After the events of the past few years, security is in the forefront of election officials’ minds. The individual states are responsible for conducting elections, so the National Association of Counties (NACo) at its annual legislative conference just conducted a series of workshops and panels on the range of threats facing election workers and voters alike. While physical threats, intimidation and harassment are primary concerns, there...
SecureWorld Healthcare
Don't miss the SecureWorld Healthcare virtual conference on May 1, 2024, to connect and learn with other cybersecurity professionals in your field! The agenda offers 12 educational sessions and 5 CPE credits.
F5 BIG-IP Next - Explore the Next Gener...
Attendees joined F5 and Government Acquisitions at the Celeste Hotel on Wednesday, July 17th for a hands-on lab featuring BIG-IP Next.All BIG-IP users were invited to this personalized training on BIG-IP Next, F5’s Next Generation Platform. During the session, attendees received a first look at the BIG-IP Next platform while going through application deployment exercises to address load balancing, application security, and app access use...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.