Using Deception Technology as part of Your Cybersecurity Defense Strategy

The risk of an attack is always present, as cyber criminals seek passwords and credentials to enter networks and applications in order to monitor and steal critical data.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

2018 Federal Contracting Webinar

CVM Solutions

CVM Solutions discusses new changes to the Federal Small Business Program and how those changes impact your supplier diversity and federal contracting program.
Watch Now

Draft 2015-16 Code of Accounting Practice and Financial Reporting

Office of Local Government

This Webinar is made available to the NSW local government sector and key stakeholders. It provides local government with an insight on the proposed changes to the Code of Accounting Practice and Financial Reporting Guidelines for the 2016-16 financial year.
Watch Now

The Lightning Round: What is Zero Trust?

In The Lightning Round, a new webinar series from Government Technology, we’re explaining these emerging concepts and demystifying gov tech one buzzword at a time. In this episode, we’re looking at Zero Trust. It has quickly emerged as an essential part of a modern cybersecurity framework. But what exactly does Zero Trust security mean? How has the concept evolved since it was introduced — and how might it continue to change?
Watch Now

2018 OFCCP Developments: What Federal Contractors Need to Know for 2019

jdsupra

In 2018 the Trump-era OFCCP began issuing policy changes that provide indications how the agency is changing its enforcement approach and where the agency is headed. This year the OFCCP issued nine directives that will guide the agency’s enforcement agenda and provide guidance on how the agency interacts with contractors.
Watch Now

Spotlight

resources