Why Intelligent Observability and Agent...
Organizations are under constant pressure to roll out new product features and enhancements to stay competitive. AI has emerged as a helpful tool, promising to boost productivity and streamline processes so organizations can focus on innovations that strengthen their core business, but many businesses are unsure of how to leverage AI effectively, let alone incorporate it into existing workflows. Intelligent observability (observability strengt...
Hack & Defend Summit Solutions Track 2025
Moving red and blue teams out of their silos means building a continuous feedback loop that translates adversarial knowledge into actionable defensive countermeasures and real fixes. At the Solutions Summit for Hack & Defend 2025, we’ll present state of the art solutions that can help you to achieve this. Furthermore, with AI and automation everywhere, it’s easy to get buried in data. In this forum, we will show you solutions t...
Google Public Sector Summit
For government leaders and IT professionals, the Google Public Sector Summit 2025 is a must-attend event. Join us in defining the future of innovation, and see how Google Public Sector, partners, and peers are building the future of the public sector and using AI to drive that change. Learn about cutting-edge products such as the newly-launched Gemini for Government that harness the power of Google’s AI-optimized and accredited commercia...
October 29, 2025
Organizer:
GovExec Location:
Washington, DC
Mission Assurance is Software Assurance
Join us for a mission-focused webinar on software assurance and secure delivery. The Department of Defense is doubling down on requirements for SBOM generation, ATO and SWFT, and teams are racing to meet rising expectations. Many legacy tools lack the automation, visibility and compliance support needed to keep pace with today’s mission-critical demands. In this webinar, cybersecurity leaders from ReversingLabs will share how public sect...
Mission FedRAMP High: Fast-Tracking Zer...
Federal agencies face unprecedented cybersecurity challenges driven by evolving threats, compliance pressures, and budget constraints. Agencies shouldn’t have to juggle extra solutions, contracts, or overhead just to comply with EO 14028, OMB M-22-09, and the DoD Zero-Trust Strategy. To navigate these complexities, agencies are turning to integrated solutions that streamline Privileged Access Management (PAM) and elevate compliance to Fe...
Securing Tomorrow: The Critical Role of...
As adversaries increasingly exploit gaps in U.S. supply chains through covert capital, shell companies, and hidden ownership, vendor vetting has become a frontline defense—not just a compliance checkbox. Join us for a dynamic panel-style webinar featuring leading experts from Babel Street, Google Public Sector, and Minella Global Strategies to explore the evolving threat landscape and the urgent need for intelligence-driven vendor vettin...
Alliant 2 DPA Training
CANCELED
All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how Alliant 2 can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against Alliant 2. This webinar is not open to...
Buying Software That Delivers: Strategi...
Join this expert-led webinar with Carahsoft and Clearwater for a behind-the-scenes look at the proven playbook for selecting and implementing enterprise software that delivers real, measurable value. Hear firsthand from those who’ve helped organizations across sectors cut through complexity, secure buy-in, and deploy solutions that drive lasting impact. During this webinar, attendees will learn how to: Navigate procurement with speed and...
Defending Identity and Securing Mission...
Phishing-resistant access is now a mandate, not a nice-to-have. But most Federal authentication workflows still rely on passwords or other shared secrets that attackers can easily exploit. These compromises often become the entry point for lateral movement inside networks, escalating the impact of a breach. Join this webinar to learn how Beyond Identity helps agencies strengthen both device and identity assurance without introducing user frict...
Operationalizing Quantum-Ready Zero Tru...
US Federal agencies are facing a dual challenge: the urgent need to adopt Zero Trust while simultaneously preparing for quantum-safe future. Executive orders like EO 14306 and EO 14028 are putting the pressure on, requiring rapid PQC and ZT adoption. How can agencies effectively bridge the gap between these two critical initiatives and successfully meet the executive mandates? The answer lies in Cryptographic Posture Management. Join Carahsoft...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.