Cohesity Federal Test Flight: DataProtect + Cloud

Join us for an afternoon to test drive Cohesity. You’ll discover how we’re redefining data management—with one platform, one UI, and the ability to run apps—to help solve mass data fragmentation.

This is your chance to test Cohesity technology with local experts. The 2.5-hour technical lab session puts the radical simplicity and power of Cohesity directly in your hands.

Discover how Cohesity spans protection, recovery, cloud integration, automation, and management all from a single, web-scale platform.

OverWatch Briefing: Stories from the Frontlines

Every day, cyber criminals, state sponsored adversaries, and others are trying to exploit systems and networks belonging to universities, hospitals, and many other types of organizations. The CrowdStrike Overwatch team is a managed threat hunting service designed to stop those breaches. Hear directly from the Overwatch team as they discuss real examples from 2020 of interactive and targeted intrusions, and how they uncovered them.

Our findings from the past year from the cyber the lines help us inform our decisions and recommendations for 2021.

Oracle One Federal

Federal agencies are looking forward to the new year with a renewed sense of possibility. 2020 has offered organizations the chance to face challenges in a new light—and with new outcomes.

Transformations that once took months, or even years, were accomplished in days or weeks. The obligation for the public sector and industry to work together to solve problems has never been greater.

The 2021 CyberMaryland Conference

The CyberMaryland Conference is an annual event presented by the Federal Business Council (FBC) in conjunction with academia, government and private industry organizations.

This year’s theme, "Building the Cyber Generation," encompasses the event’s intent to ensure the cyber-safety of today and educate the cybersecurity professionals of tomorrow.

Additionally, the conference provides an opportunity for Maryland to demonstrate its natural leadership in Cybersecurity.

Simplifying CMMC - Conquering the Most Difficult CMMC Controls

The Cybersecurity Maturity Model Certification (CMMC) sets a new minimum bar to hit if you want a shot at doing business with the Department of Defense (DoD). That means that CMMC compliance is likely at the top of your cybersecurity list and you’ve probably already done at least a little research.

As you may have noticed, one of the more difficult controls those pursuing CMMC Level 3 and up must meet is keeping a detailed log of all devices. Some levels even require 24/7 monitoring of these logs. Talk about a herculean task!

Department of State | Virtual IT Vendor Day

This virtual event is a one-day exposition with vendor speaking sessions being held virtually. Attendees will consist of Department of State (DOS) employees, including Bureau of Information Resource Management (IRM) personnel along with other departments from across the DOS enterprise.

STATE DEPARTMENT IT STRATEGIC GOALS AND OBJECTIVES:

INNOVATIVE DIPLOMACY

GOAL 1: Deliver Advanced Capabilities to Foster Collaboration, Knowledge Management and Analytics

Subscribe to