CrowdStrike | Fal.Con 2020 Virtual Experience
Fal.Con 2020 Virtual Experience is the must-attend business and technology experience for the global cybersecurity community.
During this virtual event, you’ll connect with experts from around the world while hyper-personalizing your own experience. CrowdStrike combines its industry-leading Falcon security platform with the most seasoned cybersecurity experts on the planet — and at Fal.Con 2020, you’ll take full advantage of both.
Special PeopleSoft Event: Oracle Public Sector Compliance and Regulation
The Public Sector has been one of the most strategic industries for PeopleSoft, and Oracle, for many years. Today, Oracle has several new products that state and local government agencies, as well as special districts, can take advantage of – that are integrated and designed to work with PeopleSoft.
Oracle Public Sector Compliance and Regulation is a purpose-built, cloud-native application suite that modernizes public sector licensing and permitting processes with extensible, reliable, easy to use technology. Register today and join the live webinar to learn more!
Getting Ahead of the CMMC Tsunami: Overview, Best Practices & Lessons Learned
Panel Discussion and Q&A with CrowdStrike and ECS Tech | CMMC Overview, Best Practices and Lessons Learned
Join us on August 26th at 2:00 p.m. ET for a webinar with CrowdStrike and ECS Tech experts Curt Aubrey, Shayla Treadwell, and Andy Wood. They will provide you insight in their overview, best practices and lessens learned for CMMC.
Then, they will wrap it up with the opportunity for you to ‘Ask the Experts'!
Speakers:
An AppSec Awareness Program for Developers – The Critical Steps to Success
Today, agencies are striving to improve their application security programs, while at the same time, not slowing down the development, delivery, and deployment of their software applications. Can a balance be achieved between security and an organization’s (or agency’s) daily business requirements? We know it’s possible.
Live Security Workshop: Security Automation with Red Hat Ansible Tower
As organizations rely more heavily on technology, they become more vulnerable to security threats. Red Hat Ansible Tower makes regulatory and infrastructure compliance more proactive for security and SecOps Teams.
Red Hat Ansible Tower provides Certified Content with leading security solutions and integrates with SOAR platforms to provide:
Webinar | eCrime & k-12 Education: Why Your School is a Target
Cybersecurity breaches are an unfortunate reality for all industries, with ransomware increasingly the go-to mode of attack for cybercriminals. But K-12 schools are disproportionately affected by cybercrime. More than 500 K-12 schools were victimized by ransomware in 2019 alone.
Why do cybercriminals focus on school districts? What is it about K-12 education that makes these entities such attractive targets?
Effectively Coordinating Data Roles to Optimize Data Maturity
The Foundations for Evidence-Based Policymaking Act (including the OPEN Government Data Act) created new data governance dynamics within agencies by requiring agencies to designate the Statistical Officials, the Evaluation Officers, and the Chief Data Officers. These three officials are responsible for the best practices that support the maturity of an agency's use of data. The U.S. Department of Education (ED) built a data-centric culture and is working to expand the use of data stewardship across the agency.
Webinar | Community Call: Election Interference & Disinformation
The 2016 Elections exposed glaring vulnerabilities in U.S. voting systems as hackers conducted “research and reconnaissance” against election networks in all 50 states, breached at least one state registration database, attacked local election boards, and infected the computers at a voting technology company.
Why were hackers able to expose such vulnerabilities in U.S. voting systems?
Red Hat - Intro to Kubernetes/OpenShift
Learn with the pros. Red Hat industry experts walk you through all things Red Hat Kubernetes and OpenShift
Speakers include:
- Jason Kincl, HPC Systems Engineer, National Center for Computational Sciences, Oak Ridge National Laboratory @JasonKincl
- Adam Clater, Chief Architect, Red Hat @aclater
Red Hat - Container Security
Red Hat Deep Dive into Container Security
Speakers include:
- Liz Rice, Vice President, Open Source Engineering, Aqua Security @LizRice
- Michelle Davis, Manager, App Dev Specialist, Red Hat @meskridge_davis