Back to Search Begin New Search Save Search Auto-Notify
Right-Sized DevSecOps: How Tooling Comp...
Many organizations practicing DevSecOps have collapsed under the weight of their own tooling. These organizations tried to solve delivery problems by stacking Kubernetes, Helm, GitOps controllers, scanners, and templating systems until no one can explain their own deployment path. This webcast cuts through that complexity and shows how right-sizing DevSecOps—reproducible environments, deterministic builds, type-safe configuration, and sm...
January 7, 2026
Organizer: CMU - SEI
Location: Webcast
Add Favorite
Effortless AI Inference: Deploying and...
The challenge for every IT leader is simple: Your AI projects are ready to scale, but your infrastructure isn't. High-performance inference demands agility, fault tolerance, and cost efficiency—all while keeping data governance tight. Piecing together a homegrown solution is slow, resource-intensive, and introduces unnecessary risk. This webinar will walk you through the Google Kubernetes Engine (GKE) Reference Architecture —a stan...
January 8, 2026
Organizer: Google Cloud
Location: Webcast
Add Favorite
AI Summit
AI is transforming how government agencies and organizations operate, driving efficiency, innovation and smarter decision-making. From streamlining operations and automating routine tasks to enhancing cybersecurity and improving public services, AI is reshaping the tech landscape at an unprecedented pace. Join top IT officials to explore AI’s latest advancements, challenges and future in the evolving tech landscape and discover how AI-po...
January 9, 2026
Organizer: GovCIO Media & Research
Location: Tysons, VA
Add Favorite
CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
January 12-16, 2026
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
AI-Powered Data Pipelines: Smarter, Saf...
State and local governments want to move fast with AI — but not at the expense of data security, compliance or control. In this live demo webinar, you'll see how a secure, infrastructure-level approach to AI can simplify operations, reduce manual lift and give IT leaders the peace of mind to scale confidently. This session will walk through how AI data pipelines can be automated, governed and streamlined from the storage layer — no...
January 13, 2026
Organizer: Government Technology
Location: Webcast
Add Favorite
Eliminate Attack Pivoting with Network...
Consequence boundaries connect networks with dramatically different worst-case consequences of compromise – for example, IT networks connected to base microgrids, building automation or other OT networks. At consequence boundaries, we must eliminate the possibility of online attacks pivoting into our high-consequence networks – an emerging space of network engineering. Join Waterfall Security and Carahsoft to explore how network en...
January 13, 2026
Organizer: Waterfall Security Government Team at Carahsoft
Location: Webcast
Add Favorite
Narrative Attacks Dont Go Viral on Thei...
In today’s information environment, threat actors, influencers and nation-states are targeting executives and organizations to shape public perception. These narrative attacks are intrinsically connected and aimed to cause financial, operational and reputational harm. The challenge is that these intelligence workflows often treat them as separate problems that threat intelligence and social listening can’t follow. This session draw...
January 14, 2026
Organizer: Fivecast Government Team at Carahsoft
Location: Webcast
Add Favorite
Telemetry with AI: Modernizing IT for t...
The Department of Health & Human Services (DHHS) faces mounting pressure to modernize systems, strengthen cybersecurity and deliver effective and reliable public health services—all while ensuring compliance with Executive Order 14110 on safe, secure and trustworthy AI. Join Dynatrace & Red Hat experts in-person as they demonstrate how AI-powered tools improve the DHHS' ability to provide safe, accessible and trustworthy public h...
January 14, 2026
Organizer: Dynatrace Government Team at Carahsoft
Location: Reston, VA
Add Favorite
Turning Complexity into Opportunity: Th...
Public records requests have evolved from routine administrative tasks into a defining challenge for modern government. As public records requests continue to increase in volume and complexity, agencies must balance transparency, efficiency and compliance. Join Government Technology for a fireside chat exploring the shifting landscape of government IT, what that means for public records management today and the strategies your agency can use t...
January 14, 2026
Organizer: Government Technology
Location: Webcast
Add Favorite
Success in the Cloud: How This County i...
Migrating to a cloud-based ERP system can feel daunting — especially when public-sector leaders are tasked with doing more with less. Concerns about cost, complexity, and disruption often delay critical modernization efforts. But some agencies aren’t waiting. In this exclusive webinar, IT leadership from Brevard County in Florida will share how they’re tackling those exact challenges head-on, and what they’ve learned in...
January 14, 2026
Organizer: Government Technology
Location: Webcast
Add Favorite
Back to Search Begin New Search