Virtual
-
Online
The need for increasing levels of software security is becoming even more apparent as organizations migrate applications to the Cloud and adopt DevSecOps as part of their software development and operational processes. During this panel discussion, you will hear from todays’ top industry leaders including Dr. Ross from NIST who will highlight the latest security guidance under NIST SP 800-53, Rev. 5, and the role security plays as organizations migrate applications to the Cloud and embrace DevSecOps. Experts will explore one of the new security controls outlined in NIST SP 800-53, Rev.
Virtual
-
Online
Live Panel Discussion and Q&A | Avoid Downtime and Resolve Issues Sooner with CIS Guidance
Virtual
-
Online
Cybersecurity breaches are an unfortunate reality for all industries, with ransomware increasingly the go-to mode of attack for cybercriminals. But K-12 schools are disproportionately affected by cybercrime. More than 500 K-12 schools were victimized by ransomware in 2019 alone.
Why do cybercriminals focus on school districts? What is it about K-12 education that makes these entities such attractive targets?
Virtual
-
Online
The Foundations for Evidence-Based Policymaking Act (including the OPEN Government Data Act) created new data governance dynamics within agencies by requiring agencies to designate the Statistical Officials, the Evaluation Officers, and the Chief Data Officers. These three officials are responsible for the best practices that support the maturity of an agency's use of data. The U.S. Department of Education (ED) built a data-centric culture and is working to expand the use of data stewardship across the agency.
Virtual
-
Online
Today, agencies are striving to improve their application security programs, while at the same time, not slowing down the development, delivery, and deployment of their software applications. Can a balance be achieved between security and an organization’s (or agency’s) daily business requirements? We know it’s possible.
Virtual
-
Online
The 2016 Elections exposed glaring vulnerabilities in U.S. voting systems as hackers conducted “research and reconnaissance” against election networks in all 50 states, breached at least one state registration database, attacked local election boards, and infected the computers at a voting technology company.
Why were hackers able to expose such vulnerabilities in U.S. voting systems?
Virtual
-
Online
Learn how to visualize a path to marketing excellence during this 90-minute virtual event. Hear an executive viewpoint on why it’s never been more important to understand customer signals. Then dive right into our agenda, which we designed specifically for marketers and features our customers, as well as our effervescent host, Jay Baer.
Register Now
Virtual
-
Online
Visibility is key to preventing a breach, after all, you cannot secure devices you cannot see. This is how many threat actors breach your network!
We will be discussing:
Virtual
-
Online
The recent shift towards DevOps makes it clear that Federal agencies are moving forward with adopting this operational model to facilitate the practice of automating development, delivery, and deployment of mission-critical software. While the traditional idea of a software release dissolves into a continuous cycle of service and delivery improvements, agencies find that their conventional approaches to software security are having a difficult time adapting to this new approach, since security is often viewed as an inhibitor to this new model.
Virtual
-
Online
Are you trying to build a new application that needs to incorporate location services? You are not alone. With the rise of COVID and other critical topics, there is an increasing need for applications using location and geospatial data. How do developers serve up geospatial data in a cloud native way? Come to this session to find out how. The Open Geospatial Consortium (OGC) members and international community are creating Open APIs for cloud native geospatial information access and processing (https://ogcapi.ogc.org/).