Setting the North American Net Zero Agenda
NETWORKING IS LIVE: Register today for access to the 1-to-1 event networking app Reach out to fellow attendees, speakers, and sponsors and confirm meetings before even arriving on site – don’t miss out on securing facetime with your target clients Align your schedule by signing up to event sessions and workshops through the conference app Pre-load your access pass within the app to skip the queues and speed-up your experience on th...
Power BI Fundamentals for Government
We’re excited to invite you to our first training session, Power BI Fundamentals for Government. We’ve partnered with RonInsight to create an interactive learning experience that is tailored for data and analytics professionals within the public sector. This training session applies to you, and your team, regardless of whether you are the resident data guru or just getting started. Key learning objectives include: Easily connect to...
Red Hat Government Symposium 2022
It takes perseverance, know-how, cooperation, and cutting-edge technology to address government’s biggest challenges. Are you ready to unleash innovation wherever the mission demands? Join us to discuss how to: Deploy, manage, and scale IT at the tactical edge Build cyber resiliency Accelerate end-to-end application delivery Automate IT operations consistently and simply across the entire infrastructure Enable insights and opportunities...
November 9, 2022
Organizer:
Red Hat Location:
Washington, DC
Simple Charts and Mapping
Learn how Tableau makes it simple to visualize and share insights in a way that's easy to understand for executives, decision makers, and analysts.This webinar will help you discover the key attribute that makes Tableau so important, that you can quickly discover new insights. Attend this live webinar from Tableau to: Learn how to select the right chart to best communicate your data Discover simple formatting tricks to help make your charts mo...
Raising the Barrier of Entry for Hacker...
When bad actors are looking to commit cybercrimes, they follow the path of least resistance. Unfortunately, that path often leads them to local governments. Cities, counties and municipalities have seen a surge in ransomware attacks, but strengthening their cybersecurity systems can be a challenges with limited budgets and IT security resources. A shared cybersecurity model helps under-resourced localities leverage their collective knowledge,...
Implementing Cloud Migration for Legacy...
This Panel Discussion is designed to educate the State/Local/Tribal & Territorial (SLTT) Government Partners on Cloud Migration and IT Security solutions. The panel will discuss how SLTT entities can work with GSA Schedule and FedRAMP authorized Industry Partners. You will also learn how GSA Cloud Service Offerings can help you save time and resources while meeting critical mission needs. Don’t miss out on this informative panel disc...
Beyond the Protocols: Pure's File ...
Who knew that the best coffee break conversations would end up happening online? Each month, Pure’s Coffee Break series invites experts in technology and business to chat about the themes driving today’s IT agenda - much more ‘podcast’ than ‘webinar’. This is no webinar or training session—it’s a freewheeling conversation that’s as fun as it is informative and the perfect way to break up yo...
Why Malware Protection is Essential for...
In this webinar we will cover the importance of malware protection in ensuring network security for all organizations, from large enterprises to smaller companies. Key topics: The costs of not defending against malware - “being lucky is not enough” How to deploy malware protection across your organization How malware protection keeps your users/resources safe from online threats Join us for a fascinating discussion on how implement...
VMware Cloud on AWS Demo
Join us every Wednesday at 2:00pm EST for a 30 minute demo on how VMware Cloud on AWS can provide a unified infrastructure framework that bridges the gap between private and public clouds.
Securing the Federal Supply Chain with...
Join us to hear how several new regulations and guidelines specifically point out firmware, and the firmware supply chain, as being in scope. Supply chains involving hardware, firmware, and software can be difficult to navigate. In this presentation, we'll explore how to combat issues related to an all-encompassing supply such as tampering, backdoors, and vulnerabilities.
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.