Zero Trust Training | CCZT
In the dynamic realm of digital security, the necessity for advanced cybersecurity measures is paramount. Progressive companies committed to protecting their digital infrastructure should focus on supporting their employees’ professional growth by enrolling them in the Certificate of Competence in Zero Trust (CCZT) training. This specialized course provides an in-depth exploration of the Zero Trust framework, arming participants with cut...
Cybersecurity Summit 2025
Join national leaders, innovators, and security experts for a dynamic summit exploring the evolving intersection of cybersecurity, advanced technologies, and public service. As threats grow more complex and missions become increasingly digital, this summit will spotlight how modern governments can adapt and thrive. This high-impact event will bring together voices from across federal, state, and local agencies—as well as unconventional p...
November 21, 2025
Organizer:
ACT-IAC Location:
Reston, VA
Government Infrastructure Efficiency
As the federal government begins to implement plans to build AI data centers and generation plants to support its current and anticipated demands for AI capabilities, agencies continue to pursue infrastructure modernization to streamline delivery of services. These two large-scale efforts go hand-in-hand: improving infrastructure supports mission resilience, Zero Trust security, and energy optimization, while purpose-designed AI data centers c...
November 21, 2025
Organizer:
FedInsider Location:
Webcast
2025 Vision Federal Market Forecast Con...
Presented by the PSC Foundation, the Vision Federal Market Forecast Conference is the premier event for insights into the federal marketplace. Each year, more than 20 in-depth reports are released, offering detailed analysis across the defense, civilian, and federal IT sectors. Gain firsthand perspectives from this year's Vision process, which included hundreds of roundtable discussions with senior government leaders. The conference features a...
Certificate of Cloud Security Knowledge...
Certificate of Cloud Security Knowledge v5 | Lectures and Labs Get Certified in Cloud Security with CCSK v5 Plus Certification Training Advance your career and strengthen your cloud security expertise with CCSK Certification Training—a globally recognized certification from the Cloud Security Alliance (CSA). Our comprehensive CCSK v5 Plus Training course fully prepares you for the Certificate of Cloud Security Knowledge (CCSK) exam with...
Intelligent Data Infrastructure: Poweri...
Federal Civilian agencies face mounting pressure to modernize IT infrastructure, adopt AI responsibility, strengthen cyber resilience, and embrace the cloud - all while improving efficiency, reducing costs, and protecting mission integrity. You're invited to join NetApp and Carahsoft for a webinar series designed to equip agencies with practical strategies, proven solutions, and expert insights for accelerating transformation across critical m...
SANS 2025 Detection and Response Survey...
As cyber threats grow in complexity and frequency, organizations' strategies for detection and response must continuously evolve. The SANS 2025 Detection and Response Survey webcast will delve into the current state of cybersecurity operations, questioning whether the heavy emphasis on endpoint detection is creating new blind spots. By concentrating primarily on endpoints, organizations may narrow their scope and overlook threats emerging from...
Cyturus - The Day After Compliance Series
Compliance doesn’t end with certification — it’s an ongoing commitment to security, alignment and resilience. For organizations, sustaining CMMC compliance requires more than technology; it demands continuous improvement across people, processes and operations. Join us for this expert-led Cyturus session to learn how leaders can maintain compliance, strengthen cybersecurity maturity and protect sensitive data in an evolving t...
Addressing Security Holes in Air Gapped...
As IT and security deployments migrate to the cloud, security gaps in air-gapped systems can be created unless attention focuses on threats such as data transfer from external storage media – for example, USB devices. Paradoxically, many agencies continue to maintain critical systems and data on air-gapped servers or on systems running end-of-life operating systems. The U.S. Department of War maintains critical air-gapped systems even as...
December 3, 2025
Organizer:
FedInsider Location:
Webcast
Austin Cybersecurity Conference
Join Us in Austin for the Futurecon Cybersecurity Event!Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.Don’t miss our special ceremony recognizing our...
December 4, 2025
Organizer:
FutureCon Location:
Austin, TX
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.