Closing Public Sector Security Gaps: An...
Join Carahsoft, GuidePoint and Invicti for a webinar on closing public sector security gaps. Spend an hour with Invicti learning about how to best protect your web applications and APIs with dynamic application security (DAST). Mark Townsend, Invicti’s VP of Professional Services and Jean-Paul Bergeaux, GuidePoint’s Federal CTO, will be talking about an outside-in approach to application and API security testing and: Common challen...
Managing Massive Amounts of Data in Tra...
Transportation projects involve a lot of information from various sources: environmental data, geospatial information, survey results, multi-disciplinary outputs, and more. Engineers, managers, and all other stakeholders must work with the most up-to-date and reliable data to achieve the best results. Furthermore, in a fast-paced world, flexibility and adaptability are critical. MicroStation simplifies this process by allowing engineers to att...
The Future of Document Intelligence in...
Today, public sector agencies are faced with more physical and digital documents than ever before, and gaining access to information within them is a time-consuming and labor-intensive process that hinders efficiency and productivity. Government organizations are implementing technologies like digitization, automation, artificial intelligence (AI), and cloud-based systems to improve information access and data security, streamline processes, a...
Improving Government Experiences: 4 Way...
A recent study cites that, “difficulty finding information and clarity of communications are the primary drivers of customer burden". A similar study cites, "39% of SLG leaders grade their department’s ability to deliver excellent, equitable, and secure citizen services an 'A'”. Alleviating customer burden can be challenging. Join Granicus for a complimentary webinar to hear from a government experience expert about how antic...
DoDIIS Worldwide Webinar Series: Securi...
Babel Street and Carahsoft are excited to invite you to join us in the lead up to DoDIIS 2023 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. In today's digital landscape, organizations and government agencies face a growing threat from insider risks, which can have far-reaching consequences for reputation, business continuity, loss of life, and national securi...
Mobile Security Posture at the Departme...
Developing mobile applications is difficult and fraught with challenges. The solution? Finding the best app security testing abilities to help ensure mobile app development efforts are in line with Federal requirements and standards. NowSecure analyzes and continuously monitors mobile apps for security, privacy and compliance issues, scoring the risk with actionable information to help agencies protect themselves from mobile risks in their mob...
Mayhem to Magic: How to Meet the Mandat...
In the last three years, the number of released cybersecurity mandates has doubled. From EO 14028, to BOD 23-01, 02, and (likely soon) 03, not to mention M-21-31 and M-22-09, these mandates are rarely backed with funding or staffing to help meet the reporting requirements. Rarely do agencies have the tools to report outcomes easily and in a trustworthy way. The result? Many agency CISOs and CIOs are left to fulfill an onslaught of mandates wi...
Smarter Tenant Screening: How Leveragin...
Equifax has been hard at work to deliver more comprehensive background verification services to meet the needs of government housing authorities and housing assistance programs. Starting in November, when you order The Work Number™, the gold standard in income and employment verifications, you also have the ability to order a separate, new criminal data verifications solution: Smart Screen™ Advanced - TenantCheck Government. Join u...
Operating with Continuous Compliance
Why is it important to move from reactive compliance to always compliant? Traditional approaches to ensuring standards compliance, including federal regulations like FIPS 140-2, FISMA and FedRAMP, involve slow, manual post-build security scanning as part of the authority-to-operate process. With different gates of approval, these processes catch compliance and security defects too late, creating rework and sacrificing operational agility. Prog...
Democracy Goes Digital: The One Thing T...
During this webinar, attendees will learn: How to detect both internal and external actors in voting systems Novel approaches to threat detection and response that can be deployed easily The detailed threat intelligence you will receive in real time about actors threatening election systems
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.