Stronger Together: How to Empower Feder...
Cyberthreats and breaches can be detrimental to the safety of the American people. In a recent study by the Washington Post, IT and cybersecurity experts state that the Federal agencies are more vulnerable to threats and attacks than before. The last five years have seen an increase in the success of Federal agencies’ cybersecurity due to legislation and funding. However, the threats that we are now facing have advanced in the five years...
July 21, 2022
Organizer:
ATARC Location:
Webcast
AWS Spotlight Series: Empowering Citize...
Join Brian Chidester, Steve Boberski, and Tom Yang as they discuss: Current customer experience trends in government How Genesys's partnership with AWS helps organizations deliver unparalleled citizen experiences How digital experience is becoming a game-changer
Zoom Trainings
Are you wondering what capabilities your agency can unlock with your Zoom for Government account? Don't miss out on Carahsoft's weekly trainings and discover all the tips and tricks to successfully implement your Zoom for Government account. Dive in and learn about: Account and profile settings Scheduling and starting a meeting Exciting features including virtual backgrounds and filters Zoom for Government is a FedRAMP authorized Software as a...
Indianapolis CyberSecurity Conference
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizatio...
July 20, 2022
Organizer:
FutureCon Location:
Indianapolis, IN
Cybersecurity Portfolio Virtual Ultimat...
Join us for the Virtual Ultimate Test Drive, where you'll get hands-on experience with Palo Alto Networks Cybersecurity Portfolio. In this free, three-hour virtual workshop, you will learn to Palo Alto Networks Security Operating Platform empowers you to confidently automate threat identification and enforcement across cloud, network and endpoints – using a data-driven approach and precise analytics. During this workshop you will: Protec...
Escaping Ransomware Jail: Protection Be...
Who knew that the best coffee break conversations would end up happening online? Each month, Pure’s Coffee Break series invites experts in technology and business to chat about the themes driving today’s IT agenda - much more ‘podcast’ than ‘webinar’. This is no webinar or training session—it’s a freewheeling conversation that’s as fun as it is informative and the perfect way to break up yo...
Build a Technology Roadmapping Process...
Research and development (R&D) leaders cite technology development as a critical priority as they anticipate future technology needs related to new products. Technology roadmapping can help, but it is a complex and time-consuming process. This complimentary webinar will explore different approaches to technology roadmapping, the prerequisites your organization needs to start on the process, and real-life examples of how peer R&D organi...
July 20, 2022
Organizer:
Gartner Location:
Webcast
Security Symposium
Join the Security Symposium, where IT security professionals can learn and network with Red Hat® and Intel security experts, partners, and peers to solve security issues together as a community. The Security Symposium is a full-day event with presentations from experts and a Q&A panel with all speakers. Attendees will learn about hybrid cloud security challenges organizations face and solutions to tackle these challenges. Why attend Se...
July 20, 2022
Organizer:
Red Hat Location:
Virtual
Using Stacked Technology to Increase Security
Join us to learn how to increase the security of government credentials by stacking or layering different security technology: Meet some industry experts and hear about threats to credential security Understand the challenges of building a layered security effect See some real-life examples where stacking has been used for secure documents
VMware Cloud on AWS Demo
Join us every Wednesday at 2:00pm EST for a 30 minute demo on how VMware Cloud on AWS can provide a unified infrastructure framework that bridges the gap between private and public clouds.
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.