Supply Chain Management for Operational Resilience – Where do you start?

Oct 27 2022, 12:00pm EDT

Join Edgile, Interos and ServiceNow to hear how you can leverage ServiceNow Business Continuity Management (BCM) and Vulnerability Risk Management (VRM) coupled with Interos to reinvent Supply Chain management with an AI powered SaaS platform. In this webinar, Edgile will demonstrate how Vulnerability Risk Management (VRM) can be integrated with Interos, using AI to help organizations continually assess their supply chains.

Register Now:

IT Asset Management in the Era of Zero Trust

September 21, 2022
2:00 PM Webinar

During this exclusive webinar, moderator Scott Maucione and guest Steve Wallace, chief technology officer at the Defense Information Systems Agency will discuss the IT landscape and asset management in the era of zero trust. In addition, Tom Kennedy, vice president at Axonius will provide an industry perspective.

Register Now

CISO Handbook: ICAM and Zero Trust

September 12, 2022
2:00 PM Webinar

During this exclusive CISO Handbook webinar, moderator Justin Doubleday and guest Ross Foard, ICAM subject matter expert with the Cybersecurity and Infrastructure Security Agency will explore how ICAM factors into zero trust and other modern security practices. In addition, Bryan Murphy, senior director at CyberArk, will provide an industry perspective.

Register Now

C-SCRM – Cyber Supply Chain Risk Management 2022 In Person Dinner Meeting

August 17 @ 5:30 pm – 8:30 pm PDT

Our current supply chain is severely disrupted. Freight in the major ports of Los Angeles, Long Beach, and Oakland are backed up 100 miles out to sea.  The Biden administration issued an executive order in February of 2021 about Cyber Supply Chain Risk Management the same month NISTIR 8276 about C-SCRM was published.  Our supply chain is already shattered, and a cyber-attack could be the straw that breaks the camel’s back.  We will show you how to evaluate all your supply chain risk using the NIST Cybersecurity Framework and Capability Maturity Model (CMMI).  The keys to a successful C-SCRM program are cloud deployment combined with these proven frameworks.  We will show you how we use open-source data, the Salesforce secure cloud, and portals, to automate and deploy an effective C-SCRM program anywhere in the world.

Register Now

CISO Handbook: Securing Identity in a Zero Trust Environment

August 2, 2022

2:00 PM Webinar

During this exclusive CISO Handbook webinar, moderator Justin Doubleday and guest Angelica Phaneuf, chief information security officer at Army Software Factory will break down Army’s digital transformation initiatives in relation to their identity and security strategies. In addition, Matt Tarr, solutions architect at CyberArk, will provide an industry perspective.

For More: https://federalnewsnetwork.com/cme-event/federal-insights/ciso-handbook-securing-identity-in-a-zero-trust-environment/

Secure Development for Federal Software Supply Chains

July 27, 2022

2:00 pm – 3:00 pm

Description
How are agencies developing strategies to implement cutting edge software?

During this exclusive webinar, we will break down different approaches taken in securing software during development and production. Moderator Jason Miller and agency leaders will discuss some of the most important factors when you are deciding to bring new software into your ecosystem and how to ensure that your workforce has the necessary skills.

Learning objectives:

– Current State of Software Development in Agencies
– Cybersecurity Considerations for Open Source Software
– Decisions Around Building vs. Buying Capabilities

Register