Back to Search Begin New Search Save Search Auto-Notify
Cloud Flight Simulator Part 2: Protecti...
Continuing the Cloud Security Flight Simulator series, join SEC540 Cloud Security & DevSecOps Automation author Ben Allen for a webcast on Kubernetes admission control. Kubernetes admission controllers play a critical role in enhancing the security of a Kubernetes cluster. They act as gatekeepers, intercepting requests to the Kubernetes API server before requests are processed and stored by the cluster. Learn how admission control policies...
January 18, 2024
Organizer: SANS Institute
Location: Webcast
Add Favorite
SMARTER FEDS Federal Employee Retiremen...
Discover how to maximise your benefits and make informed retirement decisions. Provided ​Light Lunch will be served ​Workbook provided at sign-in ​SF-182 provided at the conclusion to request paid time off of work ​Agenda – Know Your Numbers, Maximize Benefits, Anticipate Elections ​FERS and CSRS Pension Calculations How Social Security works with Federal Retirement Thrift Savings Plan overview and new optio...
January 18, 2024
Organizer: Smarter Feds Federal Employee Retirement Workshops
Location: Phoenix, AZ
Add Favorite
The Gartner 2024 Top Technology and Bus...
Government technology leaders face unabated pressures, both technological and societal, to deliver better, faster and increasingly more cost-effective citizen services. CIOs must simultaneously focus on digital transformation and modernization to succeed. According to a recent Gartner Legacy Modernization survey, only 5% of government CIOs have not changed their modernization strategy. Join this complimentary government webinar to identify the...
January 18, 2024
Organizer: Gartner
Location: Webcast
Add Favorite
ITAR Part 130: A Guide to Political Con...
Political contributions, fees, and commissions are commonplace in the defense market. However, staying in compliance with Part 130 of the International Traffic in Arms Regulations (ITAR) is often overlooked because of its perception as being complex and onerous. This webinar will demystify Part 130 of the ITAR by providing an in-depth review of the regulation, its place in both Direct Commercial Sales (DCS) and Foreign Military Sales (FMS), an...
January 18, 2024
Organizer: Content Enablers
Location: Webcast
Add Favorite
Jacksonville Red Hat User Group
Has the Broadcom acquisition got you down? Do you have applications where latency and hops are not an option? Join us to explore Red Hat® OpenShift® Virtualization where we are unifying management of virtual machines and containers into one platform. Learn more about helping your developers deploy faster and reduce overall spend by using the same bare-metal hardware and features included in your Red Hat OpenShift subscription.
January 18, 2024
Organizer: Red Hat
Location: Jacksonville, FL
Add Favorite
How State & Local Governments Can Secur...
State and local governments and education produce large amounts of unstructured data in a wide range of data types. From student report cards that contain personally identifiable information (PII) to municipal tax rolls full of information that fraudsters want to steal, these organizations have a data protection challenge on their hands. Keeping these diverse data sets safe and ensuring their high availability are essential for smooth educatio...
January 18, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
What in the World is Zero Trust - Why D...
One of the latest buzz terms being used is "Zero Trust" but what it is and why should anyone implement it. This webinar will go into the definition of what "Zero Trust" really is and why small to midsize businesses should consider some form of "Zero Trust" implementation. The "Zero Trust" framework is perfect for any organization that is working remotely or using a hybrid work model with employees working both in the office and/or remotely. If...
January 18, 2024
Organizer: Timus Networks | Digital Beachhead
Location: Webcast
Add Favorite
Cybersecurity Trends to Watch in 2024 f...
Taking cybersecurity measures is now critical for businesses to take into account in their 2024 planning. Every process must be scrutinized for potential vulnerabilities. Join CompTIA’s VP of Cybersecurity Programs, Wayne Selk, as he dives into the vulnerabilities that you need to address this year and key trends we’ll see in 2024. Wayne will also walk through CompTIA’s latest findings in their State of Cybersecurity for 2024...
January 18, 2024
Organizer: Barracuda Networks
Location: Webcast
Add Favorite
Human Hacking: Protect Your Organizatio...
Are you confident in your employees’ ability to withstand social engineering attempts? From tricking an employee into buying $500 worth of virtual gift cards to filling the systems of Las Vegas casino hotels with ransomware! The human element is a critical piece of your cybersecurity strategy because it is your employees and staff who could fall victim to a phishing attack and give threat actors full admin-level access to your systems! T...
January 18, 2024
Organizer: Threatlocker
Location: Webcast
Add Favorite
Defense Health Agency- Locking Down You...
How many times have you wished you could grab a cup of coffee with an expert that intimately knows the Defense Health Agency/Military Health Service, answer your questions, connect the dots and provide you with the roadmap to position your company to win new business? This is your chance to grab that cup of coffee and join us for our new GOVTECH CONNECTS series, Coffee Talk, an exclusive, industry-only event tailored for senior growth-minded e...
January 18, 2024
Organizer: GovTech Connects | DHA
Location: Arlington, VA
Add Favorite
Back to Search Begin New Search