F5 Webinar: Protect the APIs You Never...
We all use APIs, work with APIs, and attempt to secure APIs. But are you sure you have them all discovered? Are you sure that the calls to the APIs are sanitized and protected from malicious calls? Join us as we cover F5 Distributed Cloud ability to scan applications for rogue APIs, understand them, then apply a comprehensive protection that includes passive scanning to continuously tune your protection. In this webinar, you will learn about:T...
Overcoming Zero Trust Challenges in Fed...
As federal agencies advance toward implementing Zero Trust Architecture (ZTA), the path is often met with challenges ranging from managing access controls to ensuring continuous monitoring and policy enforcement. Join us to learn how ServiceNow offers a powerful, integrated platform designed to meet these needs, supporting agencies in achieving ZTA compliance and enhancing security resilience. Join our upcoming webinar to learn how ServiceNow...
How EDD's Cybersecurity Division Evolve...
Is your public sector organization struggling to combat cyber attacks? Join Elastic and California EDD to learn how Elastic provided the EDD with real-time visibility into their systems, enabling them to detect and prevent cybersecurity risks early on. During this session, Elastic & California EDD experts will discuss:California's enhanced ability to identify suspicious patterns and anomalies in their dataCalifornia's improved investigatio...
Building Resilience to Counter Cyber Th...
Security threats are more dynamic and sophisticated than ever, and static and siloed solutions are simply not enough to keep businesses protected. Cyber threat intelligence is vital for understanding, identifying and staying ahead of risks; yet many organizations struggle to operationalize tactical threat intelligence effectively. With decades of operational threat intelligence experience, Trellix has a proven track record helping organization...
Okta Identity Process Automation
Join us on November 21st for networking and insights from Okta experts on how to do more with less by automating your identity processes using Okta Identity Governance and Okta Workflows. Our Okta experts will shed light on strategies to enhance user experiences for both internal and external customers. The knowledge shared will empower you to streamline processes, bolster security, and foster seamless collaboration in your organization. Durin...
Government Contracting Under the FAR ...
Every year, firms are held liable for overhead rate errors. And it’s no wonder Federal Acquisition Regulation (FAR) overhead rates are notoriously complex and loaded with tricky nuances. Correctly interpreting and applying the FAR requirements is critically important. This year’s training sessions are updated to include the latest court cases on timekeeping and mergers and acquisitions. Additional discussion includes the 2024 Natio...
ATRW Uncover the Real CORs of the Feder...
Join us for a valuable panel discussion where Contracting Officer Representatives (CORs) share their real-world experiences in federal acquisition. Gain practical insights and learn effective tips and tricks to streamline and simplify COR responsibilities.
Alliant 2 DPA Training
Who Should Attend: All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how Alliant 2 can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against Alliant 2. This web...
CMMC Level 3 Implementation
This CMMC training event is designed to equip participants with the knowledge and skills necessary to effectively implement the Level 3 practices outlined in 48 CFR 52.204-21. These practices establish a crucial security foundation for organizations aiming to achieve higher levels within the Cybersecurity Maturity Model Certification (CMMC). Key Points: CMMC Levels: The CMMC model will encompass five maturity levels, with Level 3 being an adv...
Protecting Controlled Unclassified Info...
This 2 CPE training event "Protecting Controlled Unclassified Information" is based on NIST SP 800-171 R3." In this webinar, we will overview the essential strategies and guidelines outlined in NIST SP 800-171 Revision 3 (R3) to safeguard Controlled Unclassified Information (CUI). Our CPE training is designed to equip participants with the knowledge and tools needed to protect sensitive information from unauthorized access, disclosure, or los...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.