Back to Search Begin New Search Save Search Auto-Notify
Taking HPE to the Edge: Helping to Impr...
Edge computing is a proven approach for driving greater success on today’s digital battlefield. HPE's EL8000 is purpose-built for the extreme conditions found at the edge – providing greater performance and efficiency during military operations in austere environments or at remote diplomatic sites globally. The EL8000 is powered by the same Intel® Xeon® Scalable processors as mainstream data centers, enabling the EL800...
May 25, 2023
Organizer: HPE Government Team at Carahsoft
Location: Webcast
Add Favorite
Making the Most of Limited Cybersecurit...
Cybersecurity has consistently been the top concern of local government CIOs for several years. The primary roadblock to instituting a robust cybersecurity defense? Limited resources. Most local governments are not large, and must do a lot with very limited budgets, making it difficult to invest in cybersecurity. Experts on the front lines agree that a comprehensive approach to cybersecurity should include: Regular risk assessments Employee tr...
May 25, 2023
Organizer: Government Technology
Location: Webcast
Add Favorite
Zero Trust and High Assurance for Cloud...
Registration is closed Join Tetrate, NIST and the U.S. Department of Commerce (DoC) at the 4th Annual MultiCloud Conference to discover how your agency can realize the full potential of expanding operations to the cloud with Zero Trust Architecture. Gain actionable insights from experts in service mesh, Zero Trust Architecture, identity-centric security, open source software development and emerging NIST Special Publications. Secure your spot...
May 25, 2023
Organizer: Tetrate Government Team at Carahsoft
Location: Washington, DC
Add Favorite
Navigating CMMC Compliance: A Practical...
Seven steps for small and medium-sized businesses to get Cybersecurity Maturity Model Certification Have you heard of the Cybersecurity Maturity Model Certification (CMMC), the government’s newest mechanism for protecting sensitive information on contractor networks? If your small or medium-sized business wants to compete for government contracts, your IT infrastructure will need to meet CMMC security requirements. Join this webinar to h...
May 25, 2023
Organizer: Microsoft
Location: Webcast
Add Favorite
How to Protect your AWS Environment fro...
In this 5 part webinar series, we discuss how to best set up identify and access management, how to protect your AWS environment from network attacks, how to stay compliant, and more. Part 2: How to Protect your AWS Environment from Network Attacks. In this webinar, we’ll discuss: Network Firewall Firewall Manager Shield Web Application Firewall (WAF) Part 1: May 18 Part 2: May 25 Part 3: June 1 Part 4: June 8 Part 5: June 15
May 25, 2023
Organizer: Amazon Web Services | Forward Security
Location: Webcast
Add Favorite
Expanding Data Protection with Pure Sto...
VeeamOn23, Veeam’s annual global user and partner conference is shaping up to be an exciting event. Pure Storage and Veeam continue to work closely supporting joint customers with best-in-class data protection solutions. Join us Thursday, May 25 to learn how we are Expanding Data Protection. First, you’ll hear from technical experts David Huskisson and Zane Allyn. Together, they’ll review how Pure and Veeam enhance Object sto...
May 25, 2023
Organizer: Pure Storage
Location: Webcast
Add Favorite
The Winner's Circle 2023 Episode 2
The Federal 100 Awards is the original and most prestigious awards program celebrating federal IT professionals. Some of the honorees have a track record for success. Others are up-and-comers who charted new territory and proved what can be accomplished in the future. How have these government and industry experts changed the game? Tune in to this special installment of GovExec TV to hear from some of the Fed 100 award winners – about t...
May 25, 2023
Organizer: Government Executive Media Group
Location: Webcast
Add Favorite
How CIOs Can Lead Through the Business...
Will generative AI help or hurt your organization? The hype around 3rd party provisioned, democratized generative AI solutions such as ChatGPT and Bard continues to grow, and organizations wrestle with the implications. How are different organizations adopting generative AI? What are the privacy and data security implications to consider? Do our governance practices need to shift in response? Who should guide our generative AI initiatives? Joi...
May 25, 2023
Organizer: Gartner
Location: Webcast
Add Favorite
Cloud Workstations: The Key to a Faster...
Want faster onboarding with more consistent environments and builds? In this session, we’ll show you how Cloud Workstations can do all of this, with a live walkthrough and time for questions.
May 25, 2023
Organizer: Google Cloud
Location: Webcast
Add Favorite
Creating Informed Environments out of S...
Smart cities and sensors are the way that cities are moving but they are limited by data working in silos alone rather than cohesively working together. Limitations of “Smart” capabilities are also “reactionary” by design…but “Informed Environments” are proactive – delivering prioritized, predictive, and complete sensor-inclusive awareness. In this forum, Byteworks would like to discuss collabor...
May 25, 2023
Organizer: AFCEA Atlanta
Location: Duluth, GA
Add Favorite
Back to Search Begin New Search