Arizona CIO/CTO Forum-2022
Open to Public Sector only. This year’s 16th annual Arizona CIO/CTO Forum will take place early fall! The forum is designed to specifically address the unique interests and needs of Arizona’s K-12 educational IT community. Be part of a thoughtful networking and professional development opportunity that is designed for CIOs, CTOs, instructional technology leaders and their teams from around the state. The forum is hosted by the Cent...
AFCEA NOVA Naval IT Day
Today's Naval, Navy and Marine Corps strategies have a common theme building command and control and business system networks that support the warfighter. Naval IT Day is focused on what Modernization means, the critical elements to move these efforts forward, the impediments, and programs and opportunities that support Modernization efforts.
October 25, 2022
Organizer:
AFCEA NOVA Location:
McLean, VA
Improving End User Experience for Missi...
When the "Fix My Computer" social post went viral in early 2022, instead of dismissing or ignoring, the reaction from U.S. Air Force leadership was to embrace the idea that improving end user experiences and IT performance was critical for mission success. Join the Air Force's Chief Experience Officer (CXO) Col. Lloyd "Colt" Whittall for an engaging and informative discussion about how the Air Force has embraced the call to improve end user ex...
FCW Workshop: Innovations in Health IT
Health technology has rapidly evolved to meet the changing needs of government agencies, health care providers, and patients during the pandemic. Many of these innovations, such as telemedicine, virtual reality training, and streamlined user experiences, are here to stay. However, there is still work to be done to realize the full potential of health IT. At the heart of this innovation, and its challenges, is data. When properly managed, data-...
October 25, 2022
Organizer:
GovExec 360 Location:
Virtual
Discover the Benefits of the Cloud
Registration is Closed With cyber and ransomware attacks on the rise, it's critical for organizations to be protected from end to end. With so many employees working from home, this puts a strain on security protocols. Is your current disaster recovery up to the task? Join VMware and Carahsoft for a webcast to hear our field sales subject matter expert discuss the benefits of implementing VMware's Cloud, and how you can leverage this valuable...
Innovations in Health IT
Health technology has rapidly evolved to meet the changing needs of government agencies, health care providers, and patients during the pandemic. Many of these innovations, such as telemedicine, virtual reality training, and streamlined user experiences, are here to stay. However, there is still work to be done to realize the full potential of health IT. At the heart of this innovation, and its challenges, is data. When properly managed, data-...
October 25, 2022
Organizer:
FCW Location:
Webcast
Cloudflare Zero Trust Roadshow
The theory and concepts behind Zero Trust are now pretty clear. More than anything, businesses simply need easy, practical ways to take Zero Trust adoption one step at a time. So, how can your organization build a realistic plan to chip away at a security modernization journey? Sooner than they think. Transformation takes time, but adopting Zero Trust does not have to be so hard. The key is breaking it into manageable pieces. Join Cloudflare e...
October 25, 2022
Organizer:
Cloudflare Location:
Tysons Corner, VA
The Journey Map for IT Leaders to Chang...
CIOs increasingly encounter that the main barriers for their enterprise's digital ambitions does not come from the IT organization, but from the rest of the business areas. Many CIOs are mandated to create a digital mindset in their companies, but those who are not explicitly mandated still feel the pressure of the expectation that they need to lead this mindset shift. Join this complimentary webinar, where you will understand the journey map...
October 25, 2022
Organizer:
Gartner Location:
Webcast
Get the Risk Out! How to Manage Third-P...
News Flash: You’re not just responsible for your own organization’s risk anymore. You need to watch out for your friendly, and sometimes not-so-secure, business partners, too. Third-party risk assessment is crucial to the defensibility of your cyber ecosystem, yet the task can be daunting. How do you know whether a third party has been the victim of a security breach? Which ones are most likely to experience a ransomware attack? W...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.