Closing Federal Agency IT/OT Visibility Gaps
Many federal agencies are experiencing a "visualization gap" where IT and security leaders can't see all the vulnerable assets within their environment or understand the full extent of their IP addressable asset inventories. This is due to the increasing amount of unmanaged and undermanaged devices that are barely visible, typically only by IP address. Join Armis, ShorePoint, and Carahsoft for this complimentary webinar to discuss why total as...
Attack Surface Management from Palo Alt...
The attack surface of universities and school districts ballooned in recent years with the explosion of remote learning. It's never been more critical to have an up to date inventory of all assets - including IP addresses, domains, certificates, cloud infrastructure and physical systems - connected to your organization. You can't predict with certainty how you will be attacked in the future, but you can learn from recent attacks - and from the...
Moving to an Endpoint-Centric Zero Trus...
Join SentinelOne on May 26th, to learn the Guiding Principles of ZERO Trust: Never trust, always verify-Treat every user, endpoint, application or workload, and data flow as untrusted. Authenticate and explicitly authorize each to the least privilege required Assume breach-Operate and defend resources with the assumption that an adversary already has a presence within the environment. Deny by default and scrutinize all users, endpoints, data f...
What's New in OpenShift 4.10?
Evolving technical demands and resource constraints are spurring public sector teams to embrace innovative solutions that support IT modernization, at scale.Red Hat OpenShift, an enterprise-ready Kubernetes container platform built for an open hybrid cloud strategy, provides your organization with a consistent application platform to manage hybrid cloud, MultiCloud and edge deployments.With each new iteration, OpenShift delivers unparalleled e...
Getting Started with Fraud Investigatio...
Forecasting in Tableau is as simple as drag and drop, but how does Tableau's forecasting really work - behind the drag and drop? Why does forecasting behave the way it does? How can you change Tableau's forecasting model? Why doesn't your forecast work? How can you leverage linear regressions and cluster analysis?Join this live webinar to explore Tableau's forecasting capabilities as well as Benford's Law. Get ready to predict the future!Durin...
Reimagine Cybersecurity
Situational awareness of cybersecurity risks is achieved through assessing and monitoring every corner of your network and the threats that are a part of that landscape. Explore key strategies and approaches to implement the next generation cyber safety structure ahead of the bad actors without ripping and replacing your existing cybersecurity tools. Gain insight on the challenges in the current approach to cybersecurity practices, and how to...
Adobe ColdFusion Workshop
Registration is now closed Join our complimentary Adobe ColdFusion Workshop to learn how you and your agency can leverage Adobe ColdFusion to create amazing web content. This one-day training will cover all facets of Adobe ColdFusion that developers need to build applications that can run across multiple cloud providers or on premise. Specifically, the workshop will explore: The major features in the latest release of Adobe ColdFusion How to...
The Executive Order and What it Means f...
The Executive Order on improving the nation's cybersecurity (EO14028) outlines several standards and requirements that federal civilian agencies, working in partnership with the private sector, must meet in order to foster a more secure cyberspace. With endpoint security and event logging unified on a single FedRAMP cloud platform, Elastic stands ready to help agencies meet and exceed EO requirements with an affordable infrastructure model tha...
RockIT Learning Series Track: Google Cl...
During this webinar, we will cover: Google Cloud Platform (GCP) cloud-native solutions for governance and compliance Cost management Standards compliance for GCP Governance best practices Infrastructure automation
Hands-on Lab Series Part 1: Advanced Ca...
Join us for an interactive session on conducting end-to-end analysis. To start off, we will unpack how Federal, State, and Local agencies are utilizing data driven approaches to enhance their operations, including reconciliation, risk assessment, and data deduplication. During this webinar, you'll go hands-on and learn how to apply these techniques for yourself. You will learn how to bring in and merge different sources of data, ensure data qu...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.