Adobe Data & Insights for the Public Se...
Time to Take Agency Insights on the Customer Journey The inability to deliver seamless, relevant cross-channel and cross-device end-to-end experiences results in dissatisfied customers who don’t engage with government for their service needs. During this session, agencies will learn how to leverage profile data sets with analytics data to drive website improvement understanding, optimize communication effort and constituent experience ac...
Amazon Connect: Beyond the Basics: Sale...
This small group, interactive workshop series offers an opportunity to take your Amazon Connect skillset to the next level. In this technical series, we'll dive deep into some advanced features of Amazon Connect, for those already familiar with the basic Amazon Connect services. This 2-hour virtual workshop covers core concepts related to the provisioning, configuration, and management of Salesforce Service Cloud Voice. This session will inclu...
September 21, 2022
Organizer:
VoiceFoundry Location:
Webcast
Understanding Mission Critical Back Off...
“Workflow warfare” is a term within the Department of Defense that calls attention to and places value on back office functions, which serve a critical role in mission success but can be overlooked when considering modernization and digital transformation. That concept is applicable beyond the boundaries of the military, however; accelerating those workflows will allow faster transformation and provide advantages in meeting any age...
September 21, 2022
Organizer:
FEDINSIDER Location:
Webcast
FCW Workshop: Supply Chain Risk Management
In a digital world where almost everything is connected, protecting the supply chain of products becomes even more critical to protecting the security of the data, the networks, and the people using those products. Several high-profile breaches have been linked to supply chain issues, and agencies have received multiple policy directives and guidance as they work to secure their large attack surfaces. A number of tools are now available to hel...
September 21, 2022
Organizer:
GovExec 360 Location:
Virtual
IT Asset Management in the Era of Zero Trust
During this exclusive webinar, moderator Scott Maucione and guest Steve Wallace, chief technology officer at the Defense Information Systems Agency will discuss the IT landscape and asset management in the era of zero trust. In addition, Tom Kennedy, vice president at Axonius will provide an industry perspective. Learning objectives: Thunderdome overview SOAR overview The evolution of the IT landscape Zero trust Industry analysis
Infoblox Demo Desk
Interested in learning more about Infoblox? Join our Infoblox-Certified Demo Desk for a 30-minute demo to learn how Infoblox can provide a smarter and more efficient way to manage and protect your network from the impacts on security that are arising due to evolving IT architectures. You will learn how to leverage the foundational infrastructure you already rely on every day - DNS, DHCP, and IPAM. Our presenter will also discuss how Infoblox u...
Webinar: Are Your Cybersecurity Systems...
When error-corrected quantum computers arrive, they are expected to crack today’s -public-key-based cybersecurity. But working quantum computers may be years away, so why should you worry about this now? It turns out that hackers are already amassing large quantities of encrypted data for future decryption and exploitation. In this panel discussion with National Institute of Standards and Technology’s Bill Newhouse, former Principa...
How Can Schools Assure K-12 Vendors Emb...
Join the K12 Security Information eXchange (K12 SIX) and StateRAMP—a non-profit standardizing the cybersecurity risk management practices of state and local government vendors and suppliers—for a timely discussion and presentation about best practices and opportunities in K-12 vendor cyber risk management. K-12 cyber incident data compiled by K12 SIX reveals that the most significant vector for student and teacher data breaches...
Know Your Attack Surface From the Outside In
An attacker needs very little other than open source intelligence (OSINT) to profile an organization or individual successfully. But OSINT can also be used to protect against social engineering. In this webcast, SANS Instructor Jeff Lomas and Picnic’s CEO Matt Polak take a look at how enterprises can neutralize vulnerabilities, reduce their attack surface, and automate continuous risk detection. Register today and be among the first to...
Emulating, Detecting, and Responding to...
Join SANS Certified Instructor Jean-François Maes as he previews new material directly from the updated SANS SEC699: Purple Team Tactics - Adversary Emulation for Breach Prevention & Detection. Once attackers have gained initial access, they do not want to get caught by the suite of security tools on modern Windows systems. To stay under the radar, attackers leverage Living Off the Land Binaries and Scripts (LOLBAS). These are signe...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.