COVITS 2022 - LIVE!
Government Technology's passion is promoting best practices and spurring innovation in the public sector – more important than ever in challenging times like these. Please join us for a powerful series of sessions that provide inspiration, participation, education, and thought-provocation!
Fed Gov Sub-Contracting - Department Of...
Join us in this complimentary webinar series of 2022 covering SUBCONTRACTING. We will uncover the top Large Businesses within the 15 Federal Departments as well as contracting trends for small businesses. This series is complimentary and recorded. Please find our recordings on YOUTUBE and the slides on SLIDESHARE. Sponsorship opportunities are available. Please contact hello@jenniferschaus.com Thank You!
Innovating with Cloud: Transforming and...
State Medicaid systems are at important crossroads. The proliferation of data and new advancements in AI-powered analytics could revolutionize public health and patient care. But too many Medicaid systems still rely on legacy, on-premises systems that can’t scale or keep up with rapid change. By migrating core functions to the cloud, Medicaid agencies can implement transformative changes, modernizing whole systems to provide next-generat...
AUSA Noon Report - Pivot To Readiness w...
AUSA’s Noon Report webinar series features presentations by senior Army leaders responsible for key programs and initiatives, as well as contemporary military authors who weave together the past, present and future story of the United States Army. Please join us on Wednesday, 7 September, at 12:00 PM EDT, to hear a presentation by LTG R. Scott Dingle. Joined by CSM Diamond Hough, Dingle will discuss how U.S. Army Medical Command is reor...
SANS Network Security 2022: Bonus Sessi...
This session will walk through a demonstration of Pentera: The Automated Security Validation solution. Organizations over the years have been following a defense in depth model to protect their critical assets. While this strategy makes sense; the tools, processes, and procedures surrounding this initiative have grown significantly. How confident can organizations be that each layer and the enormous effort undertaken is working effectively? D...
Network Security 2022 Bonus Session: Ze...
The Zero Trust framework is based on the principle of "never trust, always verify." Join us to learn about Zero Trust, how to adopt it for applications, and the technologies you need to take control of your environment in the fight against ransomware.
Implementing XDR to Detect Threats and...
The “cat-and-mouse” game between Attackers and Defenders is as old as the LoveLetter virus. While script-kiddies have matured to become cybercriminals, hacktivists, and state-sponsored adversaries, sometimes it feels like the Defenders are stuck in 1999. We deploy anti-virus solutions, monitor the perimeter, and wait and see. Yes, today’s security technology is “Next Gen,” “2.0,” and “Meta,...
Droidcon New York 2022
droidcon NYC 2022 will take place on September 1-2, 2022 in NYC at the Brooklyn Expo Center. For 12 years, developers from around the world have gathered at droidcon events to listen to keynote speakers, attend workshops, grow their skills and connect with other passionate Android developers. At droidcon NYC you will: Learn from the experts. Be inspired - leave with practical ideas you can implement straight away. Develop conne...
Intelligently Developing a Cyber Threat...
This webcast will showcase the newly developed Mandiant Cyber Threat Intelligence (CTI) Analyst Core Competencies framework; discuss how FOR578 is one of the seminal trainings available in the market for analysts to develop knowledge, skills, and abilities defined within the framework, and highlight the exact parity via the recently produced SANS blog on the topic. We then speak with a panel of CTI directors on their experience growing up in...
SANS 2022 Report: Detecting and Prevent...
Software supply chain attacks have become a go-to technique for threat actors. But today, most software supply chain attacks target dependencies where threat actors get higher return on investment. After all, why compromise one piece of software when you can compromise every piece of software that uses a given library? Software dependency attacks have been used to deploy Cobalt Strike, steal API keys to compromise assets deployed in AWS, and...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.