Right-Sized DevSecOps: How Tooling Comp...
Many organizations practicing DevSecOps have collapsed under the weight of their own tooling. These organizations tried to solve delivery problems by stacking Kubernetes, Helm, GitOps controllers, scanners, and templating systems until no one can explain their own deployment path. This webcast cuts through that complexity and shows how right-sizing DevSecOps—reproducible environments, deterministic builds, type-safe configuration, and sm...
January 7, 2026
Organizer:
CMU - SEI Location:
Webcast
Effortless AI Inference: Deploying and...
The challenge for every IT leader is simple: Your AI projects are ready to scale, but your infrastructure isn't. High-performance inference demands agility, fault tolerance, and cost efficiency—all while keeping data governance tight. Piecing together a homegrown solution is slow, resource-intensive, and introduces unnecessary risk. This webinar will walk you through the Google Kubernetes Engine (GKE) Reference Architecture —a stan...
AI Summit
AI is transforming how government agencies and organizations operate, driving efficiency, innovation and smarter decision-making. From streamlining operations and automating routine tasks to enhancing cybersecurity and improving public services, AI is reshaping the tech landscape at an unprecedented pace. Join top IT officials to explore AI’s latest advancements, challenges and future in the evolving tech landscape and discover how AI-po...
CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
AI-Powered Data Pipelines: Smarter, Saf...
State and local governments want to move fast with AI — but not at the expense of data security, compliance or control. In this live demo webinar, you'll see how a secure, infrastructure-level approach to AI can simplify operations, reduce manual lift and give IT leaders the peace of mind to scale confidently. This session will walk through how AI data pipelines can be automated, governed and streamlined from the storage layer — no...
Eliminate Attack Pivoting with Network...
Consequence boundaries connect networks with dramatically different worst-case consequences of compromise – for example, IT networks connected to base microgrids, building automation or other OT networks. At consequence boundaries, we must eliminate the possibility of online attacks pivoting into our high-consequence networks – an emerging space of network engineering. Join Waterfall Security and Carahsoft to explore how network en...
Narrative Attacks Dont Go Viral on Thei...
In today’s information environment, threat actors, influencers and nation-states are targeting executives and organizations to shape public perception. These narrative attacks are intrinsically connected and aimed to cause financial, operational and reputational harm. The challenge is that these intelligence workflows often treat them as separate problems that threat intelligence and social listening can’t follow. This session draw...
Telemetry with AI: Modernizing IT for t...
The Department of Health & Human Services (DHHS) faces mounting pressure to modernize systems, strengthen cybersecurity and deliver effective and reliable public health services—all while ensuring compliance with Executive Order 14110 on safe, secure and trustworthy AI. Join Dynatrace & Red Hat experts in-person as they demonstrate how AI-powered tools improve the DHHS' ability to provide safe, accessible and trustworthy public h...
Turning Complexity into Opportunity: Th...
Public records requests have evolved from routine administrative tasks into a defining challenge for modern government. As public records requests continue to increase in volume and complexity, agencies must balance transparency, efficiency and compliance. Join Government Technology for a fireside chat exploring the shifting landscape of government IT, what that means for public records management today and the strategies your agency can use t...
Success in the Cloud: How This County i...
Migrating to a cloud-based ERP system can feel daunting — especially when public-sector leaders are tasked with doing more with less. Concerns about cost, complexity, and disruption often delay critical modernization efforts. But some agencies aren’t waiting. In this exclusive webinar, IT leadership from Brevard County in Florida will share how they’re tackling those exact challenges head-on, and what they’ve learned in...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.