Back to Search Begin New Search Save Search Auto-Notify
SANS Ransomware Summit 2025
Ransomware attacks are widespread because they are highly profitable and effective for cybercriminals. Many organizations are unprepared for such attacks, leading to serious financial and operational damage. The SANS Ransomware Summit brings together cybersecurity professionals to share insights on preventing, detecting, and recovering from ransomware. The Ransomware Summit will explore these topics:Ransomware intrusion emulationRansomware ini...
May 30, 2025
Organizer: SANS Institute
Location: Virtual
Add Favorite
Rocky Mountain Information Security Con...
RMISC is the only conference of its kind in the Rocky Mountain region. A convenient, affordable knowledge-builder for IT security, audit and compliance professionals at all levels, RMISC provides the perfect blend of education, networking and opportunities that are critical to success in today’s economy and security climate.
May 28-30, 2025
Organizer: ISACA
Location: Denver, CO
Add Favorite
Data & Digital Tools Workshop
Building a data-driven, digital government with streamlined operations and efficient service delivery requires modern tools, so filling skill gaps and overcoming legacy system challenges is critical in order to execute a successful digital transformation strategy. The way people interact with federal agencies and navigate important resources is transforming as more e-government platforms are built, online processes are automated and open data...
May 29, 2025
Organizer: GovExec
Location: Webcast
Add Favorite
Safeguarding Students, Responders and R...
Imagine trying to stop thousands of cyber threats every single day. That's the reality IT teams worldwide are facing when it comes to cyberattacks. Discover how to enhance your own organization's security posture by hearing firsthand from Texas A&M University's experience in unifying their security operations. Join Elastic to explore how Texas A&M University achieved security efficiency and reduced incident resolution times by 99% and...
May 29, 2025
Organizer: Elastic Government Team at Carahsoft
Location: Webcast
Add Favorite
CyberThreats 2025 - State & Local Requi...
State and local, territorial, and tribal governments are not bound by the federal agency mandate to implement zero trust architectures, but there are numerous reasons they are either considering it or taking action to put it in place. Zero trust is a particularly important concept for these smaller government bodies because they own and operate critical infrastructure and provide vital day-to-day services to their residents, from issuing drive...
May 29, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
2025 Effective Market Research (MRAS)
Target Audience: Federal/State/Local Agencies and MilitaryAttention all public sector employees in the contracting and acquisition career field! In GSA's Market Research As a Service (MRAS) Customer Training: Effective Market Research (Fed/Military), you'll learn the importance of market research, how and when to conduct it, and how to get the best results by making your data collection methods more efficient. You'll also delve into the regula...
May 29, 2025
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
The Future of Cloud Security Starts wit...
Modern cloud attacks are fast, stealthy, and constantly evolving—can your security strategy keep up? Join us for an eye-opening session that explores why traditional security tools are falling short and how runtime visibility is becoming a critical pillar of modern cloud defense. What You’ll Learn:Why detecting and responding to cloud attacks is more complex than everHow the dynamic nature of cloud infrastructure challenges traditi...
May 29, 2025
Organizer: SANS Institute
Location: Webcast
Add Favorite
The New Perimeter: Enforcing Security E...
Today’s SLED environments are more distributed than ever with libraries, schools, remote offices and field teams all relying on secure Wi-Fi and cloud-connected infrastructure. But these access points are now prime targets for threat actors who bypass traditional perimeter defenses. In this session, we’ll explore how threatER extends real-time, patented threat blocking to wherever you connect whether at the Wi-Fi access point, on-p...
May 29, 2025
Organizer: threatER Government Team at Carahsoft
Location: Webcast
Add Favorite
Avoiding Pitfalls in Costpoint Time and...
OverviewThis FREE webinar will offer attendees practical guidance on key considerations and common missteps associated with Deltek’s Costpoint Time and Expense modules. Our team will walk through critical setup and processing steps in both the Timekeeping and Expense modules, highlighting frequent problem areas that can impact accuracy, efficiency, and compliance. Attendees will gain actionable insights to help streamline processes, redu...
May 29, 2025
Organizer: Redstone Government Consulting
Location: Webcast
Add Favorite
Automate Smarter: Windows, Ansible and...
Join Red Hat and Carahsoft on May 29th for a mission-driven virtual session on how Ansible Automation Platform simplifies, secures and scales Windows management for DHS environments. In this session, you will learn how to:Automate patching, configuration and user management on Windows systemsEnforce consistent security policies across environmentsIntegrate Windows automation into existing workflows and CI/CD pipelinesAchieve compliance faster...
May 29, 2025
Organizer: Red Hat Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search