Upstream Attacks, Downstream Risk: How...
Nation-state adversaries and other bad actors are exploiting gaps in federal IT supply chains – from open source libraries to software vendors – to breach upstream providers and infiltrate downstream systems. In this on-demand webinar, experts share insights on where the federal supply chain is most at risk, how attackers are using AI to evade detection, and what forward-leaning mission partners are doing to harden their defenses f...
Delivering on Defense: DevSecOps for Se...
As digital services boom, Federal civilian agencies must keep security top-of-mind – starting with their application development processes. How can teams cut across agency siloes to ensure a unified, secure experience for the citizens they serve? Join us Tuesday, April 27 to learn about the progress VA is making, executing on the common mission of continuous application integration, testing, and delivery – all while maintaining the...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.