Answer the White House Call to Action I...   
                      
                                                       
                            
                                In this webinar, Logan Brown, CEO at Exodus Intelligence, will explain the importance of vulnerability intelligence with the White House push to increase cyber defense, and the use of Exodus' methodology to analyze N-Day and Zero-Day threats. Exodus Intelligence employs some of the world's most advanced reverse-engineers and exploit developers to provide Government agencies the unique ability to understand, prepare, and defend against the ever...
                                                                            
                                                
                                               
                     
                   
                    	                
                    
                      
                      What does Zero-Trust Mean to SLED Cyber...   
                      
                                                       
                            
                                Join Mitch Rosen, Global Director of Solutions Engineering, as he discusses how CISA and OMB's ZTA pillars directly align to ongoing modernization and security priorities of state, local, and educational institutions. In this webinar, topics will include: What are the Zero-Trust pillars and why are they important? How do you augment existing processes with Zero-Trust architecture? As SLED organizations improve their cybersecurity posture, how...
                                                                            
                                                
                                               
                     
                   
                    	                
                    
                      
                      Hardening the Cyber Quiver   
                      
                                                       
                            
                                Traditional approaches to information security are reactive and antiquated. In an era where technology is on-demand, we can no longer afford to be reactive, we must revolutionize all security practices while increasing our capabilities.Following on the heels of executive directives and combined guidance, we must evolve to meet the demands of cybersecurity while embracing Zero Trust and the enablers of secure infrastructures, continuous monitor...
                                                                            
                                                
                                               
                     
                   
                    	                
                    
                      
                      The Federal Healthcare Threat Landscape...   
                      
                                                       
                            
                                Join us for this intel and training perspective with Proofpoint. Agenda: Overview of the current Federal Healthcare threat landscape and Q1 2022 analysis - including Conti, Emotet, COVID-19, Credphish, and everything in between Current Federal Healthcare attacks and lures, and what to do about them - threat intelligence to support IT/messaging, security teams, and focused high-payoff security awareness training Conclusion and wrap-up - recomme...
                                                                            
                                                
                                               
                     
                   
                    	                
                    
                      
                      Adobe ColdFusion Advanced Workshop   
                      
                                                       
                            
                                Due to popular demand, registration for this event is now closed. We apologize for this inconvenience. Join our complimentary Adobe ColdFusion Advanced Workshop to learn about the fundamental building blocks of DevOps, Adobe ColdFusion, and Continuous Integration/Continuous Delivery (CI/CD). Throughout this workshop, you will be provided with clear illustrations on how to increase efficiency while adopting modern development principles, and m...
                                                                            
                                                
                                               
                     
                   
                    	                
                    
                      
                      Add an Early Warning System to Your Sec...   
                      
                                                       
                            
                                From Log4J to hybrid work models, the evolving and dynamic IT environment expands the attack surface creating more vulnerabilities and risks for public sector organizations. Understand the cyber security challenges Attack Surface Management (ASM) solves and how it can be easily integrated into any cyber defense program.Join Jonathan Cran, VP R&E, Attack Surface Management, and Alexa Rzasa, Sr. Product Marketing Manager, to learn how ASM ca...
                                                                            
                                                
                                               
                     
                   
                    	                
                    
                      
                      Modernizing Federal Health IT   
                      
                                                       
                            
                                The last two years have shown us that the Federal Health sector has and continues to transform into a digital powerhouse. As the transformation continues, DevSecOps and cloud technologies are becoming more prominent. Software factories are being stood up in order to become more agile and create opportunities to create consistent processes that apply across all application development and deployment. Join GitLab experts on April 28th to: Learn...
                                                                            
                                                
                                               
                     
                   
                    	                
                    
                      
                      Secure Data Center Hosting with Atlassian   
                      
                                                       
                            
                                As more agencies adopt Atlassian services in the cloud, there are increased privacy and security risks, of which the public is acutely aware. For IT professionals, compliance with privacy and security standards is critical.The Federal Risk and Authorization Management Program (FedRAMP), standardizes the approach to security assessment, authorization and monitoring for cloud products and services used by federal agencies to protect data in the...
                                                                            
                                                
                                               
                     
                   
                    	                
                    
                      
                      Build a More Secure Future with Google...   
                      
                                                       
                            
                                During this webinar, we will cover: Google Workspace as a solution for continuity of operations and disaster recovery Overview of Google security offerings: Security Command Center, Chronicle, VirusTotal, reCAPTCHA, BeyondCorp, and Work Safer program 
                                                                            
                                                
                                               
                     
                   
                    	                
                    
                      
                      Managing Microservices with Full-Stack...   
                      
                                                       
                            
                                Does your agency use traditional monitoring implementations that are cumbersome, cost-prohibitive, and limited in their ability to generate metrics, events, and logs? Does it trace with one hyper-scalable cloud platform? New Relic's Full-Stack Observability is the evolution of Application Performance Monitoring (APM) and allows government agencies to view, monitor, and troubleshoot Microservices, including infrastructure and underlying service...
                                                                            
                                                
                                               
                     
                   
                                     
       
     
                    
          
        
     
 
	You must be logged in to view details.
	Membership is Free! 
	
	 
	
	
	
 
  
    
Please enter your email and password: 
      
  
 
  
    Please sign in with your email and password: 
    LinkedIn is experiencing technical difficulties. Please log in via email and password.  If you do not remember your password, please click "Forgot Password" to reset.