Spreadsheets to Solutions: Empower Nonp...
Join us for a first look at the newly enhanced Tableau Next platform, the API-first analytics experience integrated with Agentforce. Built on a unified data layer and trusted semantics, Tableau Next delivers personalized, contextual and actionable insights to every user. Whether you are a data expert or new to analytics, this webinar will make it easier for everyone in your nonprofit organization to make more informed, mission-driven decisions...
Enabling Crypto-Agility for Your PQC Journey
Join CyberArk and Carahsoft for a session on Machine Identity Security – Enabling Cryptographic Agility for your PQC Journey In this session, attendees will review the progression of quantum computing along with industry recommendations to help agencies prepare for and transition to post quantum cryptography. Specific topics will cover:Industry trends are helping agencies prepare for automating processes for encrypted assets.Practical re...
Safeguarding AI: Smart, Secure Innovati...
Artificial Intelligence (AI) is transforming how government and education agencies deliver on their missions — but innovation must be secured from the start. Join experts from Google, Box, and Palo Alto Networks for an exclusive public sector webinar focused on how agencies at the federal, state, and local levels can safely adopt and scale AI initiatives. This session will cover how to protect sensitive data, ensure compliance with evolv...
Government Marketing - Beyond the Playbook
Join us for a candid, no-nonsense discussion on the realities of government marketing in today’s environment. Led by a team of industry veterans, this complimentary online hour-long session dives deep into the strategies, missteps, and evolving dynamics shaping marketing success in the public sector. Over lunch, we’ll unpack the hard truths—what works, what doesn’t, including how to navigate shifting policies and procur...
WIDS in the Public Sector for Today's Threats
As unmanaged wireless devices continue to pose significant risks to classified environments, selecting and deploying an effective Wireless Intrusion Detection System (WIDS) has become an important responsibility. Learn about the challenges military decision-makers face when evaluating and implementing WIDS solutions for today’s complex threat landscape. Join us to explore:A clear framework for evaluating WIDS capabilities aligned with DO...
Observability That Works for Everyone:...
Higher education environments are complex by nature—diverse systems, sprawling infrastructure, and decentralized ownership across IT, research, security, and facilities. As data volumes increase and platforms multiply, institutions are struggling to get a clear, unified view of what's happening across their environments. In this session, we’ll explore how higher ed organizations can take back control of their observability strategy...
How CA State Agencies Leverage Forescou...
Please join Carahsoft and Forescout for an informative and interactive session that will help you better understand how the use cases and capabilities of Forescout can help your California agency gain total device visibility and protection. During this session, you will learn how Forescout enables:Total device visibility - including rogue device detection and up to 800 data points per deviceCompliance readiness and enforcement - deep visibilit...
Charting the Course: A Buyer's Guide to...
State and local agencies face a critical inflection point: modernize legacy infrastructure or risk falling behind. Now is the time to explore smarter, more strategic virtualization options. Join Red Hat for an exclusive virtual event designed to guide your agency from exploring OpenShift Virtualization to confidently implementing it. This session will walk you through: What OpenShift Virtualization is and how it supports both containers and VM...
June 24, 2025
Organizer:
Red Hat Location:
Webcast
The Strategy Behind Meeting CMMC Requirements
The purpose of the Cybersecurity Maturity Model Certification is to have in place the security and privacy controls that give information systems greater resilience in the face of a wide range of dangers, including malicious attacks, natural disasters, structural shortcomings, human error, and hostile nation-state surveillance. The catalog of controls is laid out in the National Institute of Standards and Technology Special Publication 800-53...
June 24, 2025
Organizer:
FedInsider Location:
Webcast
Unlock Generative AI innovation to spee...
Join Red Hat on June 24th to discover how Red Hat Enterprise Linux Artificial Intelligence (RHEL AI) enables mission-driven AI solutions for the U.S. Air Force and Space Force. This virtual event covers customizing generative AI using InstructLab and Granite models to meet warfighter needs. Learn how AI can enhance decision-making, ISR, autonomous systems, predictive maintenance and training. Register via the button below to:Explore the key be...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.