Preventing Ransomware Attacks with Acti...
Ransomware attacks against state and local governments are on the rise. On June 2nd, the White House urged organizations to take the necessary steps to protect themselves against ransomware. Exploiting Active Directory (AD) and attacking unpatched vulnerabilities are frequent tactics for attackers. Join Tenable and Carahsoft as we discuss how ransomware takes advantage of weaknesses in your Active Directory domains and explore ways your agency...
Transforming Higher Education with Snow...
While the last year has seen tremendous efforts in higher education to educate students, the global pandemic has both highlighted and amplified the significant challenges facing colleges and universities around the country. A dramatic change in the way institutions collect and make use of data to support the student journey was desperately needed to help address significant issues. Invoke Learning uses the Snowflake Data Cloud to take educatio...
Deploying Tableau Server: Secure, Gover...
The 38th Commandant of the Marine Corps states, “All of our investments in data science…are designed to unleash the incredible talent of the individual Marine.” Unleash your incredible talent with data in your mission area. From manning, training, and equipping the forces, to finance to installations and logistics, learn how to see and understand your data with Tableau. During this webinar, attendees will learn how to: Empow...
Private Access: Learn How to Eliminate...
It's important to understand the difference between private access provided by a platform supporting Zero Trust principles and access delivered through Virtual Private Networks, or VPNs. Although both private access to private resources, the way users are granted access to those resources via iboss Private Access is drastically different. The iboss Private Access service inverts the VPN model completely. Instead of granting a user access to pr...
Top 10 Questions on the Single Audit an...
While the American Rescue Plan Act (ARPA) has been passed into law and relief is already being distributed to states, counties, cities, tribes, and territories, there are still many lingering questions. One of the top questions coming up - "Will my entity be subject to a single audit?" Most likely the answer is “yes". The last thing you want your government organization to experience is audit findings and the risk of owing money to the...
Unifying Cyber Defense Teams with Share...
The ThreatQ platform is designed to improve security operations workflows by delivering immediate and significant value across multiple use cases to include data management, prioritization, integrations, collaboration, and curated threat data sharing. ThreatQ provides the ability to securely share curated threat data between organizations automatically. Whether to block an IP, detonate a malicious file, or alert an organization to a possible n...
Adobe Digital Learning Seminar for Canada
As the pandemic has changed the way the world works and operates day-to-day, so has the way in which we disseminate training materials. A virtual training program must adapt to all aspects of adult learning while maintaining a high level of engagement. Join us online for a complimentary seminar to discover how to create and maintain high levels of retention and engagement in an online learning environment. Our team of eLearning experts will te...
How to Fast-Track Your Agency's Infrast...
Congressional funding is right around the corner which means project and approval timelines are shrinking, and different project groups are often vying for priority. With many public works projects competing for funds, it is important to quickly and effectively rally stakeholders and citizens behind a single vision of your proposed infrastructure project and its impact. However, unifying different points of view often requires using different...
Zscaler CMMC Webinar Series
The DOD’s Cybersecurity Maturity Model Certification, or CMMC is designed to protect its Supply Chain partners from cyber-attacks. CMMC will require any company providing a product or service to the DOD, directly, or indirectly, to achieve CMMC certification by 2025, with some contracts already calling out CMMC as a requirement. This will impact roughly 300,000 companies and over $400B of DOD contract awards annually. Join Zscaler on Jul...
Zero Trust Security for Agencies
Zero Trust is an evolution of a range of past security architectural approaches and concepts; think network segmentation, least privilege, and defense. The key difference being Zero Trust brings a different mindset to how we design and build security to support the idea of starting with no implicit trust and that we assume a breach has already occurred. The Department of Defense (DOD) released a publication in the Spring of 2021 on Zero Trust...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.