Don't Get Blindsided by Mobile Gaps in...
Software Supply Chain Risk Management for Mobile Applications, from large MDM systems to only a handful of 3rd-party created apps, is a difficult undertaking. NowSecure can show you how the app stores do not protect you from vulnerabilities and how to assist you in further developing your Mobile Application Risk Management Program. From easily creating a Software Bill Of Materials for your existing Mobile Applications, to automating the vettin...
Going Mobile to Increase Operational Ef...
The Texas Department of Public Safety is one of the largest state patrols in the country and has an area of responsibility of almost 270,000 square miles. Texas DPS has recently expanded its use of smartphones to include issuance of mobile devices to all officers. The agency established a Solutions Center to effectively work through bureaucratic constraints and provide space for collaboration that would identify business and operational soluti...
Bastille Presents: Wireless Intrusion D...
Join us as Dr. Brett Walkenhorst, CTO from Bastille Networks, walks us through an Executive Briefing on how detecting phones, wearables and RF gadgets becomes reality with Bastille, enabling next-level security and securing sensitive meeting areas. Bastille's real-time Cellular, Bluetooth, BLE and Wi-Fi detection and location system locates all authorized and unauthorized devices within a campus or forward deployed location.
Boost Growth with Best-in-Class Functio...
As providers of significant advances directed by feedback from the Acumatica community, Acumatica delivers adaptable cloud and mobile technology with a unique all-inclusive user licensing model, enabling a complete, real-time view of your business anything, anywhere. Are you ready to experience this transformation with Acumatica General Business Edition? In this webinar, you will gain insight into: How you can gain a complete foundation for a...
September 1, 2022
Organizer:
Acumatica Location:
Webcast
ATARC and FMG's Mobile Breakfast Summit
Join this breakfast webinar to hear experts discuss security features for mobile tools, technologies, products, 5G, and services; and examine how agencies can improve on enterprise-wide mobile security strategy and policy. What lessons have experts learned while working with 5G and the cloud? What challenges have they faced while modernizing their agency’s cloud services? What best strategies did they have to put in place to overcome the...
August 30, 2022
Organizer:
ATARC Location:
Washington, DC
Salesforce Innovation Day in Florida
Join us in person on August 24th to learn how revolutionary technology platforms easily integrate with your current infrastructure - enabling automation, mobile, and rapid response to change. We will discuss the following: Marketing Cloud and leveraging the full Salesforce platform capabilities across professional services MuleSoft implementation Centers of Excellence and Best Practices Grants Management Hear presentations from the Florida Pre...
8-Part Adobe Digital Learning Webinar S...
Taking the Classroom Online Preparing for a post-pandemic world while adapting to ever-changing circumstances is leaving organizations to embrace hybrid work schedules while continuing to navigate business continuity. Now more than ever, creating an engaging virtual learning environment is vital, and many organizations are navigating how to produce intriguing digital learning content and deliver it to any audience effectively and efficiently,...
Mobile Device Investigator Training
ADF Solutions is excited to offer a complimentary, hands-on, instructor-led training for Mobile Device Investigator® (MDI), and a free 6-month license and MDI User Certificate to all attendees upon completion of the training! Attendees will learn how to configure MDI, operate the mobile phone forensic software and interpret results. We are pleased to be offering the full-day training live in Reston, VA, with the option of attending one of...
GovForward ICAM Workshop
Identity takes center stage as zero trust implementations grow. Identity has been key to individual access to information for some time in government, but it has often been based on physical access cards. As the federal government now begins a move to accommodate more mobile devices in non-traditional environments, agencies are working to consolidate and update their identity systems to protect a broad range of access by individuals and device...
Don't Get Blindsided by Mobile Gaps in...
Software Supply Chain Risk Management for Mobile Applications, from large MDM systems to only a handful of 3rd-party created apps, is a difficult undertaking. App Stores do not protect you from vulnerabilities. We can assist you in further developing your Mobile Application Risk Management program. From easily creating a Software Bill of materials for your existing mobile applications, to automating the vetting of all new releases from the app...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.