Back to Search Begin New Search Save Search Auto-Notify
Zero Trust for Critical Infrastructure
Given the most recent Zero Trust guidance and directives from the Whitehouse, OMB, CISA, NSA and DoD, what role does Zero Trust Architectures play in the foreseeable future? How and where will this impact our IT Critical Infrastructure? What impact will Zero Trust have on the federal government’s expanding adoption of IoT? During this digital event government and industry experts will explore what Zero Trust means for the nation’s...
November 8, 2021
Organizer: GovExec Media
Location: Webcast
Add Favorite
AWS Cloud Practitioner Essentials Day
This course is for individuals who seek an overall understanding of the Amazon Web Services (AWS) Cloud, independent of specific technical roles. You will learn about AWS Cloud concepts, core AWS services, security, architecture, pricing, and support to build your AWS Cloud knowledge. This course also helps you prepare for the AWS Certified Cloud Practitioner exam. In this course, you will learn how to: Define what the cloud is and how it wor...
November 8, 2021
Organizer: Amazon Web Services (AWS)
Location: Webcast
Add Favorite
Zero Trust for Critical Infrastructure
Given the most recent Zero Trust guidance and directives from the Whitehouse, OMB, CISA, NSA and DoD, what role does Zero Trust Architectures play in the foreseeable future? How and where will this impact our IT Critical Infrastructure? What impact will Zero Trust have on the federal government’s expanding adoption of IoT? During this digital event government and industry experts will explore what Zero Trust means for the nation’s...
November 8, 2021
Organizer: Government Executive Media Group
Location: Webcast
Add Favorite
CIOs Can Play a Critical Role in Enabli...
Almost every organization claims the customer comes first, but is that really the case? Join us for this complimentary webinar as Gartner experts explore what it means to execute a true customer-centric strategy. CIOs and IT leaders will learn the benefits of this approach, how to evolve your IT delivery model to gain these benefits, and how you can measure the impact of a customer-centric strategy. You also will discover how fusion teams can...
November 8, 2021
Organizer: Gartner
Location: Webcast
Add Favorite
How Cybercriminals Use Open Source Inte...
Every day, cybercriminals are conducting reconnaissance on open source intelligence (OSINT) — or information that is publicly available on the internet — about your agency and the individuals in it. They’re combing through websites, IP addresses, social media accounts, digital files like photos and videos, geospatial information and more to gather information about their target and identify their weaknesses. It’s the fi...
November 8, 2021
Organizer: Government Technology
Location: Webcast
Add Favorite
Detecting DCSync and DCShadow Network Traffic
In order to interact with a real domain controller, Mimikatz can spoof a Windows domain controller, and read information from or write information to active directory. Mimikatz's DCSync command is used to read information: typically, it is used to dump credentials from active directory. And the DCShadow command is used to write information: for example, modify the primary group of an account to a group with higher privileges. The use of these...
November 5, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
AWS Technical Essentials Day
Course Details: In this introductory course, you will learn about AWS products, services, and common solutions. You will learn the fundamentals of identifying AWS services so that you can make informed decisions about IT solutions based on your business requirements. Topics Covered: In this course, you will learn: Terminology and concepts related to the AWS platform How to navigate the AWS Management Console Key concepts of AWS security measur...
November 5, 2021
Organizer: Amazon Web Services (AWS)
Location: Webcast
Add Favorite
Microsoft Security Virtual Training Day...
As people increasingly shift to remote work, protecting your organization’s information and managing risk should be a top priority. Microsoft Security Virtual Training Day: Protect Sensitive Information and Manage Data Risk teaches you how to take advantage of Microsoft technologies that identify and remediate risks that arise from creating, storing, sharing, and using sensitive data. In addition, you’ll learn how to protect that d...
November 4-5, 2021
Organizer: Microsoft
Location: Webcast
Add Favorite
Bloomberg Financial Innovation Summit
Financial technology has grown by leaps and bounds over the past several years, with early disruptions giving rise to the adoption of new industry standards in a very short period of time. From the early days of disruptions in payment systems and mobile banking to the latest trends in social media-driven retail investing and cryptocurrencies, technologists have continually pushed the edge of what’s possible. Powered by the analytical pow...
November 4-5, 2021
Organizer: Bloomberg
Location: Virtual
Add Favorite
Modern Excel Analyst in a Day - P3 Adaptive
The workshop aims to bring awareness of advanced capabilities available in Excel, to empower Modern Excel analysts to see what’s possible, to explore how Excel & Power BI are best used together and how Excel & Power BI can be integrated in Microsoft Teams & SharePoint Online. Upon completion of this workshop attendees will: Have Awareness of Power Query & Power Pivot in Excel (Modern Excel) Learn how Power Query & Pow...
November 4, 2021
Organizer: Microsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search