Public Sector Technical Workshop: NoSQL With Apache Cassandra™
DLT, Deloitte, and DataStax invite you to join us on Wednesday, September 16th for a virtual workshop as we discuss how Apache Cassandra™ NoSQL open source database technology and cloud-native architecture can help your agency improve their mission performance and drive government efficiency. This hands-on session will cover the fundamentals of Apache Cassandra and how you can simplify it using DataStax Astra, their Cassandra-as-a-Service offering.
Who’s Ready for the CMMC? What Data Reveals About Defense Sector Cybersecurity?
In the upcoming months, the Cybersecurity Maturity Model Certification (CMMC) ecosystem will go live, turning the CMMC into a contractual reality for thousands of companies comprising the Defense Industrial Base. Are organizations ready? What should commercial assessors expect to find during their reviews? How is the sector performing when it comes to cybersecurity?
CrowdStrike | Fal.Con 2020 Virtual Experience
Fal.Con 2020 Virtual Experience is the must-attend business and technology experience for the global cybersecurity community.
During this virtual event, you’ll connect with experts from around the world while hyper-personalizing your own experience. CrowdStrike combines its industry-leading Falcon security platform with the most seasoned cybersecurity experts on the planet — and at Fal.Con 2020, you’ll take full advantage of both.
Special PeopleSoft Event: Oracle Public Sector Compliance and Regulation
The Public Sector has been one of the most strategic industries for PeopleSoft, and Oracle, for many years. Today, Oracle has several new products that state and local government agencies, as well as special districts, can take advantage of – that are integrated and designed to work with PeopleSoft.
Oracle Public Sector Compliance and Regulation is a purpose-built, cloud-native application suite that modernizes public sector licensing and permitting processes with extensible, reliable, easy to use technology. Register today and join the live webinar to learn more!
Getting Ahead of the CMMC Tsunami: Overview, Best Practices & Lessons Learned
Panel Discussion and Q&A with CrowdStrike and ECS Tech | CMMC Overview, Best Practices and Lessons Learned
Join us on August 26th at 2:00 p.m. ET for a webinar with CrowdStrike and ECS Tech experts Curt Aubrey, Shayla Treadwell, and Andy Wood. They will provide you insight in their overview, best practices and lessens learned for CMMC.
Then, they will wrap it up with the opportunity for you to ‘Ask the Experts'!
Speakers:
An AppSec Awareness Program for Developers – The Critical Steps to Success
Today, agencies are striving to improve their application security programs, while at the same time, not slowing down the development, delivery, and deployment of their software applications. Can a balance be achieved between security and an organization’s (or agency’s) daily business requirements? We know it’s possible.
Live Security Workshop: Security Automation with Red Hat Ansible Tower
As organizations rely more heavily on technology, they become more vulnerable to security threats. Red Hat Ansible Tower makes regulatory and infrastructure compliance more proactive for security and SecOps Teams.
Red Hat Ansible Tower provides Certified Content with leading security solutions and integrates with SOAR platforms to provide:
Webinar | eCrime & k-12 Education: Why Your School is a Target
Cybersecurity breaches are an unfortunate reality for all industries, with ransomware increasingly the go-to mode of attack for cybercriminals. But K-12 schools are disproportionately affected by cybercrime. More than 500 K-12 schools were victimized by ransomware in 2019 alone.
Why do cybercriminals focus on school districts? What is it about K-12 education that makes these entities such attractive targets?
Effectively Coordinating Data Roles to Optimize Data Maturity
The Foundations for Evidence-Based Policymaking Act (including the OPEN Government Data Act) created new data governance dynamics within agencies by requiring agencies to designate the Statistical Officials, the Evaluation Officers, and the Chief Data Officers. These three officials are responsible for the best practices that support the maturity of an agency's use of data. The U.S. Department of Education (ED) built a data-centric culture and is working to expand the use of data stewardship across the agency.
Webinar | Community Call: Election Interference & Disinformation
The 2016 Elections exposed glaring vulnerabilities in U.S. voting systems as hackers conducted “research and reconnaissance” against election networks in all 50 states, breached at least one state registration database, attacked local election boards, and infected the computers at a voting technology company.
Why were hackers able to expose such vulnerabilities in U.S. voting systems?