This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. framework and implemented zero trust solutions at the network level. Certificates will be e-mailed to registrants. He also oversaw the agency’s movement to the TIC 3.0
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Certificates will be e-mailed to registrants. Featured Speakers: Danny Page × Danny Page Inside Sales Engineer Danny Page is the Inside Sales Engineer for Rubrik.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Certificates will be e-mailed to registrants. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
Wednesday, August 21, 2024 | 2:00PM EDT | 1 Hour | 1 CPE Power grids, water systems, transportation networks and other vital services are essential to communities but lack substantial cyber defenses. Their vulnerabilities make them tempting targets, whether for nation-states or cybercriminals. Certificates will be e-mailed to registrants.
Monday, September 16, 2024 | 2:00PM EDT | 1 Hour | 1 CPE Federal agencies’ systems are targeted by hostile interests all the time, whether it’s through a vulnerability in their networks or through a third-party product. Certificates will be e-mailed to registrants.
An automated solution can monitor the entire network, apply routine updates, and flag anomalous activity that requires greater attention. To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Certificates will be e-mailed to registrants. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
Tuesday, January 23, 2024 | 2:00PM EST | 1 Hour | 1 CPE Zero trust revolutionizes network security architecture because it is data-centric and designed to stop data breaches. While that is its primary purpose for government, it also increases agility for modern networks that traditional network designs can’t emulate.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Certificates will be e-mailed to registrants. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Without a comprehensive data strategy, the legal and ethical challenges limit the potential of this emerging technology. Certificates will be e-mailed to registrants.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Certificates will be e-mailed to registrants. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
The spread of 5G was accelerated by the pandemic, as agencies and businesses alike had to transition to a work-from-home environment, requiring at-home workers to have the same network performance and access as they did in the office. Certificates will be e-mailed to registrants.
For instance, 5G networks must have state-of-the-art security and encryption, since they will be targets of cyber attacks, espionage and data breaches. To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. enterprise, non-terrestrial network and public sector customers. Certificates will be e-mailed to registrants.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Certificates will be e-mailed to registrants. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. DoD, he has been awarded the Annual Individual Award for Defending the DoD’s Networks. Certificates will be e-mailed to registrants. As a Cyber Leader in the U.S
Evaluate the types of metrics that can be used to measure improvement in customer satisfaction. Program Level: Beginner/Intermediate Delivery Method: Group Online Training * To receive a Training Certificate you must arrive on time and participate in the surveys throughout the webinar. Certificates will be e-mailed to registrants.
An automated solution can monitor the entire network, apply routine updates, and flag anomalous activity that requires greater attention. To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART.
Learning Objectives We’ll Discuss: Identify techniques to enhance third-party work to minimize the need for post-production remedies Outline metrics for improved developer productivity and modernization initiatives Evaluate ways to include data masking, data classification, data security, etc., Certificates will be e-mailed to registrants.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Certificates will be e-mailed to registrants. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
To view this webinar: CyberSmart 2023 – Combating Cyber Crime in State & Local Government. Gayle’s background also consists of Adjunct Professor, Business & Industry Training, Network Consultant, real estate, and the establishment of a food business based on generational family recipes.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Certificates will be e-mailed to registrants. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
The Department of Defense has adopted advanced telecommunication capabilities to support a variety of new technologies including creating private networks for the military, integrating 5G capabilities, improving supply chain logistics and more. Da Silva’s areas of interest include wireless network, 5G and beyond.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Jones is responsible for all Agency IT systems and personnel, as well as the global communications network. Certificates will be e-mailed to registrants.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Certificates will be e-mailed to registrants. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
System defenders face the ongoing challenges of resource constraints, increasingly complex networks, and data overload. To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Certificates will be e-mailed to registrants.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Certificates will be e-mailed to registrants. In accordance with the standards of the National Registry of CPE Sponsors, 50 minutes equals 1 CPE.
Agenda Learning Objectives Complimentary Registration Live Captioning CART Agenda Join us as thought leaders from government and industry outline steps that state and local officials can take to evaluate and protect their elections infrastructure. Certificates will be e-mailed to registrants.
CPE credit in Business Management & Organization.* * To receive CPE credit you must arrive on time and participate in the surveys throughout the webinar. .* * To receive CPE credit you must arrive on time and participate in the surveys throughout the webinar. Certificates will be e-mailed to registrants.
.* * To receive CPE credit you must arrive on time and participate in the surveys throughout the webinar. To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Certificates will be e-mailed to registrants.
To further discuss OT security, thought leaders from government and industry spoke at a recent FedInsider webinar to share the tools they need to tackle the increasing amount of OT threats and the role visibility plays in preventing attacks on IT systems through OT.
To view this webinar: Learning From log4j: How to Keep Government Applications Secure. Prior to joining the Treasury in 2016, Sarah Nur held numerous leadership positions in systems engineering, IT network deployment (worldwide), and operational cybersecurity supporting public and private organizations. For six years at FMC, Inc.,
.* * To receive CPE credit you must arrive on time and participate in the surveys throughout the webinar. To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Certificates will be e-mailed to registrants.
Navigating the public procurement process can be challenging enough then add in Buying Groups, GPO’s or group purchasing organization, collaborative procurement initiatives, purchasing networks, collaborative sourcing partners, they go by so many names. They can be government agencies, not for profit organizations, or private companies.
.* * To receive CPE credit you must arrive on time and participate in the surveys throughout the webinar. To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Certificates will be e-mailed to registrants.
Brendan Peter, VP, Global Government Affairs of SecurityScorecard, notes the importance of continuous risk assessment and evaluating the impact of policies to ensure they reduce cyber threats. To view this webinar: Metrics that Matter for Critical Infrastructure Cyber Resilience.
In this webinar, they tell us how they created successful vendor engagement and support strategies and built these processes into their organizations. Here are the highlights of this discussion or you can watch the webinar here. How did you approach designing your diversity initiatives and evaluating your strategy?
Zero Trust has revolutionized the way agencies everywhere are securing their networks, and this week on Feds at the Edge , we talk with titans in the field, including John Kindervag, Chief Evangelist with Illumio, who in 2010 coined the phrase “ zero trust model.” To view this webinar: Zero Trust is Needed to Win the Cyber War.
PAP 2021-05, Evaluation of FSS Program Pricing, is one such example. This PAP fundamentally alters the MAS negotiation process, establishing evaluation standards, requirements, and procedures not found in the Federal Acquisition Regulation (FAR) or the General Services Acquisition Regulation (GSAR).
JD Jack, General Manager for Google Public Sector Cybersecurity, talks how “security validation” can show you how to look at the tools you have, and find a way to evaluate them. To view this webinar: Be Prepared: The Cyber Wild West is Still Wild.
This year’s tables include: November 20: GSA MAS PMO GSA Pricing Tools Medical/Surgical Supply BPAs SAM.gov PMO VA Federal Supply Schedule (FSS) November 21: VA FSS VA Prosthetics Community Care Network (CCN) View the agendas for more details. FCI or CUI) exists on its network and where the data traverses.
Assemble your team of friends and colleagues and save the date to compete for prizes, network with colleague, and contribute to some worthy causes. View the webinar recording here. This year’s tournament will be August 21 at the scenic Whiskey Creek Golf Club in Ijamsville, Maryland. Listen to the full podcast here.
To view the CART feed for this webinar: Register for this webinar, login from the link provided, and click on the CART Tab and click the link to begin using CART. Close VP, Worldwide Public Sector Technology & Innovation, AWS Joe Boye × Joe Boye System Engineer Joseph Boye is a System Engineer with Palo Alto Networks.
Attackers can gain unauthorized access to a company’s data if Active Directory is compromised; monitoring your AD will help protect system integrity, availability, and overall cybersecurity. .* * To receive a Training Certificate you must arrive on time and participate in the surveys throughout the webinar.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content