Understanding Mission Critical Back Off...
“Workflow warfare” is a term within the Department of Defense that calls attention to and places value on back office functions, which serve a critical role in mission success but can be overlooked when considering modernization and digital transformation. That concept is applicable beyond the boundaries of the military, however; accelerating those workflows will allow faster transformation and provide advantages in meeting any age...
September 21, 2022
Organizer:
FEDINSIDER Location:
Webcast
FCW Workshop: Supply Chain Risk Management
In a digital world where almost everything is connected, protecting the supply chain of products becomes even more critical to protecting the security of the data, the networks, and the people using those products. Several high-profile breaches have been linked to supply chain issues, and agencies have received multiple policy directives and guidance as they work to secure their large attack surfaces. A number of tools are now available to hel...
September 21, 2022
Organizer:
GovExec 360 Location:
Virtual
IT Asset Management in the Era of Zero Trust
During this exclusive webinar, moderator Scott Maucione and guest Steve Wallace, chief technology officer at the Defense Information Systems Agency will discuss the IT landscape and asset management in the era of zero trust. In addition, Tom Kennedy, vice president at Axonius will provide an industry perspective. Learning objectives: Thunderdome overview SOAR overview The evolution of the IT landscape Zero trust Industry analysis
Infoblox Demo Desk
Interested in learning more about Infoblox? Join our Infoblox-Certified Demo Desk for a 30-minute demo to learn how Infoblox can provide a smarter and more efficient way to manage and protect your network from the impacts on security that are arising due to evolving IT architectures. You will learn how to leverage the foundational infrastructure you already rely on every day - DNS, DHCP, and IPAM. Our presenter will also discuss how Infoblox u...
Webinar: Are Your Cybersecurity Systems...
When error-corrected quantum computers arrive, they are expected to crack today’s -public-key-based cybersecurity. But working quantum computers may be years away, so why should you worry about this now? It turns out that hackers are already amassing large quantities of encrypted data for future decryption and exploitation. In this panel discussion with National Institute of Standards and Technology’s Bill Newhouse, former Principa...
How Can Schools Assure K-12 Vendors Emb...
Join the K12 Security Information eXchange (K12 SIX) and StateRAMP—a non-profit standardizing the cybersecurity risk management practices of state and local government vendors and suppliers—for a timely discussion and presentation about best practices and opportunities in K-12 vendor cyber risk management. K-12 cyber incident data compiled by K12 SIX reveals that the most significant vector for student and teacher data breaches...
Know Your Attack Surface From the Outside In
An attacker needs very little other than open source intelligence (OSINT) to profile an organization or individual successfully. But OSINT can also be used to protect against social engineering. In this webcast, SANS Instructor Jeff Lomas and Picnic’s CEO Matt Polak take a look at how enterprises can neutralize vulnerabilities, reduce their attack surface, and automate continuous risk detection. Register today and be among the first to...
Emulating, Detecting, and Responding to...
Join SANS Certified Instructor Jean-François Maes as he previews new material directly from the updated SANS SEC699: Purple Team Tactics - Adversary Emulation for Breach Prevention & Detection. Once attackers have gained initial access, they do not want to get caught by the suite of security tools on modern Windows systems. To stay under the radar, attackers leverage Living Off the Land Binaries and Scripts (LOLBAS). These are signe...
VETS 2 DPA Training
Who Should Attend: All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how the VETS 2 GWAC can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against the VETS 2 GW...
The Story of Instructure: How AWS Cloud...
From almost day one, edtech company Instructure has leveraged the cloud from Amazon Web Services (AWS) on its way to becoming the biggest learning management system (LMS) provider in the country. After successfully scaling up its main platform Canvas, Instructure faced the new hurdle of integrating various acquisitions and growing into different business lines. Collaborating with AWS, the company overcame these challenges and established a bur...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.