VMware Cloud on AWS Demo
Join us every Wednesday at 2:00pm EST for a 30 minute demo on how VMware Cloud on AWS can provide a unified infrastructure framework that bridges the gap between private and public clouds.
Securing the Federal Supply Chain with...
Join us to hear how several new regulations and guidelines specifically point out firmware, and the firmware supply chain, as being in scope. Supply chains involving hardware, firmware, and software can be difficult to navigate. In this presentation, we'll explore how to combat issues related to an all-encompassing supply such as tampering, backdoors, and vulnerabilities.
Optimizing Automated Email Marketing to...
All digital engagement tools let you send emails to your members. Many digital engagement tools let you automate those emails. But how many associations are sending custom, dynamic, automated emails? We will walk you through the three most important member journeys to help you grow membership, engage with your current members, and bring back those members that are ghosting you. Join us to learn actionable strategies associations can use to enh...
November 9, 2022
Organizer:
Attain Location:
Webcast
Red Hat Ansible for Windows Automation...
This workshop guides you through configuring Ansible® automation controller to connect to Windows Server instances for automating various operational tasks. Once Ansible automation controller is configured, you will start with automating simple tasks and then progress to more advanced use cases such as patching and leveraging third-party solutions to enhance automation (Chocolatey). There are minimal client requirements for you to interact...
November 9, 2022
Organizer:
Red Hat Location:
Virtual
AFCEA Belvoir Industry Days 2022
General Information NEW LOCATION FOR 2022!We are pleased to have the 2022 AFCEA Belvoir Industry Days take place at the Westfields Marriott Washington Dulles hotel in Chantilly, VA. This location provides free parking for participants with all conference activities in close proximity to each other!Who is AFCEA Belvoir?AFCEA Belvoir serves as a bridge between government requirements and industry capabilities, representing the top government, in...
ATARC Cybersecurity Executive Order Bre...
Cyber threats are evolving at such rates that Federal training of cybersecurity practitioners are struggling to keep up. The continued cybersecurity push across government and industry, it is increasingly important for organizations to have proactive cyber plans in place. As the nation looks to recover from a once-in-a-century pandemic and increasingly more sophisticated cyberattacks, the U.S. government must ensure that it can secure its netw...
November 8, 2022
Organizer:
ATARC Location:
Washington, DC
govDelivery Administrator Training 101
This training will most benefit administrators of all levels and will focus on the following day-to-day operations.: Topic creation Subscriber upload - including troubleshoot Advanced Bulletin personalization (template development) Advanced Bulletin create and send Bulletin analytics reporting Our training sessions last roughly an hour and are conducted by a member of our Implementation Team. Using Zoom, you'll be able to view the computer scr...
November 8, 2022
Organizer:
Granicus Location:
Webcast
Conference Call Security with MeetingOne
Join AWS and MeetingOne for a webinar on Tuesday, November 8th, at 11:00am ET as we discuss the importance of audio conference security. MeetingOne is a world-wide communications solution provider of web and audio conferencing products that meet strict regulatory standards to ensure your agency is protected. In this informative webinar, MeetingOne Host Zach Catto will discuss with several speakers the fears of unwelcomed participants snooping...
Seeing Cyber Threats Over the Horizon
More visibility. Most (if not, every?) cybersecurity professional will tell you they need more visibility into the threat landscape, but also their own security posture. Join SANS Analyst, Jake Williams and Chas Clawson, CTO for security with Sumo Logic, as they talk about the importance of correlating security alerts across your entire cloud and on-prem environment, and enriching with threat intelligence and other feeds for context and improv...
Integrating Software Supply Chain Secur...
Sophisticated threat actors are turning to Software Supply Chain attacks to evade today’s defenses. Tactics include inserting malicious code into open-source repositories like npm and PyPi, developing attacks leveraging new software vulnerabilities, and infiltrating vendor development environments to insert malicious packages into their software solutions. In the last year, ReversingLabs observed a 289% increase in threats involving open...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.