Back to Search Begin New Search Save Search Auto-Notify
CompTIA CySA+ Training Boot Camp
The CompTIA CySA+ Training Boot Camp prepares you to pass the CySA+ certification exam by covering the following domains: Threat and vulnerability management: Perform vulnerability management activities and analyze output from vulnerability assessment tools. Software and systems security: Apply security solutions for infrastructure management and implement software and hardware assurance best practices. Security operations and monitoring: Anal...
June 24-28, 2024
Organizer: Infosec
Location: Virtual
Add Favorite
2024 Cross Domain Technical Forum
In efforts to address this serious and systematic flaw, a new group of technologies – called cross domain solutions – emerged to enhance the federal government’s ability to access and send information from one security-level network to another. From there, the National Cross Domain Strategy & Management Office – NCDSMO set out to help agencies work together to make better sense of all the shared information and data...
June 25-27, 2024
Organizer: Federal Business Council, Inc.
Location: Laurel, MD
Add Favorite
TECHSPO Miami 2024 Technology Expo (Int...
Where Business, Tech and Innovation Collide in Miami!TECHSPO Miami 2024 is your chance to … Check out exhibitors showcasing the next generation of technology & innovation. Be inspired, amazed and educated on how these evolving technologies will impact your business for greater growth. Interact with technology enthusiasts, build your network and reunite with your peers. The 10th annual TECHSPO Miami, two-day technology expo returns J...
June 27, 2024
Organizer: TECHSPO Miami
Location: Miami, FL
Add Favorite
High-Bandwidth Oscilloscopes for Multi-...
When warfighters enter the battlefield, whether in the sky, on the ground or at sea, they depend on sophisticated radar and electronic attack jammer systems to protect them from harm. Advancements in digitizing technology and analysis software enable EW systems to undergo testing in the lab before they reach a real conflict. High-bandwidth oscilloscopes can be used for multi-port, coherent RF pulse analysis. With the combination of real-time d...
June 27, 2024
Organizer: Association of Old Crows
Location: Webcast
Add Favorite
Streamlining Collaborative Publishing B...
Adobe InDesign is constantly improving to make creatives' workflows simpler - and with Adobe InDesign plus InCopy, collaboration between designers or teams has never been easier. Adobe InCopy lets copywriters and editors make simple design modifications to a document while designers work on the same document simultaneously in Adobe InDesign — all without overwriting each other’s contributions. Join our complimentary webinar to disc...
June 27, 2024
Organizer: Adobe Government Team at Carahsoft
Location: Webcast
Add Favorite
State & Local Cybersecurity for the 202...
Election security is top of mind across the United States, from concern about malign foreign interference, to DDoS attacks against election websites, to the security of voting machines and their software, to insider and third-party threats, even to “swatting” of local election officials, to name just a few. At the heart of all these threats is the intent to change the outcome of political races. Outcomes, in the end, are determined...
June 27, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Revolutionizing Cloud Data Security wit...
As data volumes continue to soar and regulations become increasingly stringent, organizations grapple with the challenge of comprehending their sensitive data, controlling access to it and pinpointing potential vulnerabilities. To regain visibility and control, forward-thinking organizations are turning to data security posture management coupled with data detection and response. In this session, you'll learn:The security and compliance risks...
June 27, 2024
Organizer: Palo Alto Networks
Location: Webcast
Add Favorite
CTO Sessions: How-to Guide for Enhancin...
Sensitive data stored in HPE deployments must be encrypted edge-to-cloud. For encryption to successfully secure sensitive data, the cryptographic keys used to encrypt/decrypt data must be secured, managed and controlled by the data owner. Thales TCT’s CipherTrust Data Security Platform unifies data encryption and unprecedented granular access controls with centralized key management—all on a single platform. This results in fewer r...
June 27, 2024
Organizer: Thales TCT Government Team at Carahsoft
Location: Webcast
Add Favorite
The Dark Side Of Government Contracting...
If you own a business that you want to expand from the commercial market to the government market, then this training session is for you. The government is the largest customer in the world and you should be selling your product or service to your country. Find out how you can expand your business by working with Uncle Sam.NOTE: Unable to attend this session, we have an encore presentation July 15th at 5pm EST/ 2pm PST Who Should Attend:Existi...
July 8, 2024
Organizer: Government Contractors Association, Inc.
Location: Webcast
Add Favorite
Facilitating Low-Head Dam Removals and...
Join us on July 9, from 12:00 PM - 2:00 PM Eastern for Facilitating Low-Head Dam Removals and Improving Aquatic Resource Restoration Outcomes. Many low-head dams no longer serve their original purpose and their existence often poses a public safety risk and continues to have negative impacts on aquatic resources. This webinar will focus on effective strategies for low head dam removal and aquatic resource restoration in Pennsylvania over the l...
July 9, 2024
Organizer: Association of State Dam Safety Officials
Location: Webcast
Add Favorite
Back to Search Begin New Search