Achieving Decision Dominance in a Multi...
Everfox, Dell Technologies and Carahsoft invite you to join us at the Ritz-Carlton in Washington, DC, on July 15th from 1pm to 4pm ET as we explore the challenges of ‘Achieving Decision Dominance’. Decision Dominance within Government can be achieved through fostering a culture of innovation and continuous improvement. By working with industry partners, the US government can leverage expertise and advancements to secure its strateg...
The Definitive Red Hat Enterprise Linux...
Join Red Hat for an in-person workshop in Reston, VA to get hands-on with Red Hat Enterprise Linux 10 (RHEL 10), the most advanced release yet. Flipp Bunts, our featured trainer, has over 20 years of experience in designing highly-available Linux clusters and is know for his work in architecting classified networks, implementing continuous monitoring and migrating legacy Unix systems to Linux. During this training, Flipp will take the stage to...
Getting to Continuous Authorization to...
One of the most beneficial practices any agency can implement is achieving and maintaining Continuous Authorization to Operate (cATO). It allows an organization to maintain ongoing authorization for their systems and software, rather than having to obtain a one-time ATO for each deployment. Gaining a cATO requires agencies to implement continuous monitoring of the security of their systems and practicing active cyber defense measures that proa...
July 15, 2025
Organizer:
FedInsider Location:
Webcast
Non-Human Identity (NHI) Summit 2025
The rise of non-human identities (NHIs) is reshaping the cloud security landscape. APIs, service accounts, bots, and machine identities now outnumber humans in most cloud environments—and they often hold the keys to your most critical systems. Join global cloud and identity experts for CSA’s first-ever Non-Human Identity Summit, a free, two-day virtual event dedicated to tackling the complex challenges of NHI management. NHI Summit...
HEC-RAS
This course provides an introduction of HEC-RAS with applications to dam safety. The course provides a hands-on opportunity to use the program and resolve specific questions. The objective of this course is to review the basic principles of open channel hydraulics as they relate to the natural stream environment with application to dam safety. Bridges, culverts, and in-line structures will be discussed and both steady and unsteady flow modelin...
Understanding and Navigating the Servic...
OverviewFailure to understand and comply with the McNamara-O’Hara Service Contract Act (SCA), or Service Contract Labor Standards (SCLS) can lead to costly outcomes, withholding of contract funds, and even debarment. Cross-functional (i.e., Human Resources, Contracts, Payroll, Accounting) understanding of the SCA is imperative to successfully administer an SCA contract. Many contractors find SCA confusing and intimidating, which often le...
The Two-Edged Sword of AI in Cybersecurity
Artificial Intelligence (AI) is transforming cybersecurity for the better—empowering teams to detect threats faster, reduce false positives, and identify risky behavior before it becomes a breach. But there are risks associated with AI: first, that AI tools currently are new to organizations and under-regulated for their own cybersecurity, so require careful review; also, as defenders become more sophisticated with those AI tools, so do...
July 16, 2025
Organizer:
Fedinsider Location:
Webcast
Securing the Blind Spots of On-Prem Ser...
In this webinar, attendees will learn how to:Understand the hidden risks of Non-Human Identities (NHIs): Explore the security challenges NHIs pose in hybrid environments and why traditional identity tools fall short.Gain visibility and control: Learn how to discover, classify and monitor NHIs across on-prem and cloud systems using Silverfort’s Identity Security Platform.Strengthen your identity security posture: See how real-time risk as...
Defending the DON: Validating Cyber Rea...
In this session, attendees will: Gain quantifiable insights into your security posture by seeing how Mandiant Security Validation (MSV) continuously tests your network, endpoint, cloud, and email security controls against real-world threat actor tactics. Optimize existing security investments and configurations while justifying security spend with empirical performance data and clear reporting on identified gaps and cyber readiness. Learn to a...
Zero Trust Training | CCZT
In the dynamic realm of digital security, the necessity for advanced cybersecurity measures is paramount. Progressive companies committed to protecting their digital infrastructure should focus on supporting their employees’ professional growth by enrolling them in the Certificate of Competence in Zero Trust (CCZT) training. This specialized course provides an in-depth exploration of the Zero Trust framework, arming participants with cut...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.