VMware NSX | StorageHawk Lunch and Learn
Secure Your Data Center with VMware NSX and StorageHawk Most enterprise IT professionals agree that securing the network only at the perimeter is inadequate for today's data centers. Once malware has managed to make its way behind the firewall by latching onto an authorized user (or other means), it can move easily from workload to workload. This lateral movement is possible due to a lack of sufficient client internal network controls regulati...
Complying with the Presidential Executi...
This on demand webinar will provide guidance on how to approach complying with the executive order issued on May 11, 2017 that requires all agencies to provide a risk management report to the Department of Homeland Security (DHS) and the Office of Management and Budget (OMB) within 90 days. The order states “The President will hold heads of executive departments and agencies accountable for managing cybersecurity risk to their enterprise...
Spike Photo Measurement and Mobile Data...
Never rely on ladders, tape measures, and expensive laser range finders again! View our complimentary on-demand webinar to learn how Spike makes it easy to capture measurements and GPS location for hard-to-reach objects like building exteriors, signs, natural resources, and more — simply by using a smartphone tablet camera, the Spike App, and the Spike laser device. During this webinar, we'll examine: Why different industries such as tra...
Hunt for Malware at Your Most Vulnerabl...
Endpoints – now more than ever – remain the most vulnerable attack vector. Complicating matters further, security solutions such as antivirus software on endpoints, are simply unprepared for these new threats. Join us on May 25th to learn how RSA NetWitness® Endpoint helps address this challenge by helping security teams detect and respond to known, unknown, and non-malware endpoint attacks. NetWitness® Endpoint is the endp...
Adobe DHS Webinar: Protect High Value A...
Improving cybersecurity continues to be one of the predominant focuses of the Federal Government as agencies look for solutions to bolster their current security posture. Today the most impactful opportunities center on implementing stronger measures to manage documents and data rights. As targeted threats increase in scope and severity, these protective safeguards are imperative and should not be missing from any agency's arsenal. Faced with...
Protect Your Network Against Cyber Spies
Government networks, critical infrastructure, and data are under a constant state of attack. The nature of these threats evolve on a daily basis. Hacktivists, nation states, and cyber criminals push people, processes, and technologies that make up government cyber defenses to their breaking points. Join Gigamon, FireEye, and Splunk at the International Spy Museum for a panel discussion about the top 10 best practices for cyber security profess...
Salesforce Campaign Studio Webcast: Sha...
Please join Salesforce for an exclusive thought leadership webcast on how hospitality companies can enhance customer loyalty through personalized marketing and engagement to increase sales and overall customer satisfaction. The webcast will feature Blair Linville, CEO and Founder of Tectonic and a 2x Dreamforce Main Stage speaker. Before founding Tectonic, Blair served as the CIO for Harrahs Entertainment, a $12B company differentiated by pow...
Federal Telework: Is your agency's tele...
A guide to effectively use technology to telework; improve productivity, assure continuity of operations, and respond to the changing needs of the workforce Teleworking, or telecommuting, has gained a foothold in the Federal Government in recent years. With benefits for employees, such as avoiding long commutes, saving time, improving work/life balance, and having greater job autonomy and satisfaction, it is easy to see the appeal of a more fl...
Speaker Series Dinner: How to Win: Insi...
For our May speaker series, the APMP-NCA chapter is pleased to present a full panel of current and previous Federal Government proposal evaluators. These panelists will provide answers to the proposal evaluation questions you have been dying to ask! This panel will address how the Government approaches evaluation. Are there response techniques offerors should avoid? What methods of response help the evaluators? Does language matter? Do they ca...
F5 Army Boot Camp: Federal SE 101/201 C...
Join us for an F5 Federal SE Certification Boot Camp. During the training we will be covering all of the blueprint exam points for the F5 101 & 201 certification exams. These blueprint points are the basis for the exam content, and can be found on the F5 certification page of our website. This class is not a guarantee of a passing score on the exam, it is simply meant to be a review of the content contained in the exam.Every attendee shou...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.