Health IT In Depth: Applying Technology...
The federal government is pursuing transformative advancements in healthcare IT. Most notable is the implementation of a single, unified electronic health record (EHR) system that connects multiple federal agencies, including the Department of Defense, VA, and Coast Guard. This system enables real-time data sharing across departments, streamlining care coordination and improving efficiency for millions of patients. Agencies can point to both c...
December 11, 2024
Organizer:
FedInsider Location:
Webcast
Splunk GovSummit 2024
Join public sector leaders, Splunk, and its partners on December 11th to explore the synergies between government and industry to keep our nation’s digital infrastructure reliable, trustworthy, and secure. At this event, you will have the opportunity to:Simplify cybersecurity in a complex digital worldLeverage the power of artificial intelligenceForge public-private partnershipsBuild a cyber workforceKeep pace with new requirements and r...
Top Mobile Security Stories & Trends of...
2024 has been a whirlwind year for mobile security. From new emerging threats to AI advancements, the landscape has evolved rapidly and 2025 is sure to bring new challenges. Join us for a webinar where we’ll dive into the most significant mobile security stories and trends that shaped this year and discuss cybersecurity challenges we can expect in 2025. In this webinar, our cybersecurity experts will:Recap the Top Threats: Explore the ne...
December 11, 2024
Organizer:
Quokka Location:
Webcast
Financial Virtual Cybersecurity Summit
Participate in the Financial Virtual Cybersecurity Summit, where you'll join forces with fellow financial industry experts to gain essential insights for navigating the complex landscape of cyber threats in 2024. Immerse yourself in the knowledge shared by seasoned professionals and influential leaders, while engaging directly with representatives from top-tier global providers of cybersecurity solutions tailored for the financial sector. Embr...
OT/ICS Virtual Cybersecurity Summit
Join fellow cybersecurity experts at the OT/ICS Virtual Cybersecurity Summit to gain crucial insights on combating cyber threats in 2024. This event features presentations from renowned professionals and thought leaders, as well as representatives from leading global cybersecurity solution providers. The OT/ICS Virtual Cybersecurity Summit offers an opportunity to engage with peers and industry specialists through interactive online sessions....
The Importance of FedRAMP for Defense C...
Join Deltek for an informational webinar on the Federal Risk and Authorization Management Program (FedRAMP) and its crucial role in cybersecurity and safeguarding protected data for defense contractors. This session will delve into the requirements of the Cybersecurity Maturity Model Certification (CMMC) and the importance of thoroughly vetting your cloud service providers to ensure compliance. Gain a strong understanding of how FedRAMP and CM...
Dynamic Security: Central to Achieving...
In an era where remote access and edge computing have become common, the idea of a security perimeter is out of date and ineffective. This is part of the push to move government IT systems to a Zero Trust architecture – every user and every interaction must be verified every time. This also means that cybersecurity must be dynamic, able to respond instantly to threats and able to pivot as new risks emerge. To meet the need, security has...
December 12, 2024
Organizer:
FedInsider Location:
Webcast
Enhancing Cybersecurity Operations with...
State and local governments face unique challenges in cybersecurity, from evolving threat landscapes to constrained resources and complex compliance requirements. Blackwire.ai, a purpose-built GenAI platform for cybersecurity, empowers government security teams to elevate their threat response capabilities, streamline compliance, and leverage expert-vetted insights without expanding headcount or buying expensive new systems. Join us on Decembe...
F5's Approach to Zero Trust
Protecting APIs transcends the defense of individual software components—it’s about preserving the integrity of an entire ecosystem. Furthermore, the Department of Defense (DoD) has mandated the implementation of Zero Trust architecture to ensure that all resources are accessed securely, regardless of location or user, and that continuous verification is enforced. Join this webinar where F5’s Director of Solution Engineering,...
Welcome To The League CTF
Step into the world of advanced cybersecurity in our newest Cyber Range Capture The Flag (CTF) game, "Welcome to the League". This event is tailored for individuals ready to push their red skills to the limit. Participants will engage in a series of sophisticated challenges designed to test their abilities in Active Directory enumeration, privilege escalation, and post-exploitation techniques. Do you have what it takes to join The League? This...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.