Cloud Flight Simulator Part 2: Protecti...
Continuing the Cloud Security Flight Simulator series, join SEC540 Cloud Security & DevSecOps Automation author Ben Allen for a webcast on Kubernetes admission control. Kubernetes admission controllers play a critical role in enhancing the security of a Kubernetes cluster. They act as gatekeepers, intercepting requests to the Kubernetes API server before requests are processed and stored by the cluster. Learn how admission control policies...
SMARTER FEDS Federal Employee Retiremen...
Discover how to maximise your benefits and make informed retirement decisions. Provided Light Lunch will be served Workbook provided at sign-in SF-182 provided at the conclusion to request paid time off of work Agenda – Know Your Numbers, Maximize Benefits, Anticipate Elections FERS and CSRS Pension Calculations How Social Security works with Federal Retirement Thrift Savings Plan overview and new optio...
The Gartner 2024 Top Technology and Bus...
Government technology leaders face unabated pressures, both technological and societal, to deliver better, faster and increasingly more cost-effective citizen services. CIOs must simultaneously focus on digital transformation and modernization to succeed. According to a recent Gartner Legacy Modernization survey, only 5% of government CIOs have not changed their modernization strategy. Join this complimentary government webinar to identify the...
January 18, 2024
Organizer:
Gartner Location:
Webcast
ITAR Part 130: A Guide to Political Con...
Political contributions, fees, and commissions are commonplace in the defense market. However, staying in compliance with Part 130 of the International Traffic in Arms Regulations (ITAR) is often overlooked because of its perception as being complex and onerous. This webinar will demystify Part 130 of the ITAR by providing an in-depth review of the regulation, its place in both Direct Commercial Sales (DCS) and Foreign Military Sales (FMS), an...
Jacksonville Red Hat User Group
Has the Broadcom acquisition got you down? Do you have applications where latency and hops are not an option? Join us to explore Red Hat® OpenShift® Virtualization where we are unifying management of virtual machines and containers into one platform. Learn more about helping your developers deploy faster and reduce overall spend by using the same bare-metal hardware and features included in your Red Hat OpenShift subscription.
January 18, 2024
Organizer:
Red Hat Location:
Jacksonville, FL
How State & Local Governments Can Secur...
State and local governments and education produce large amounts of unstructured data in a wide range of data types. From student report cards that contain personally identifiable information (PII) to municipal tax rolls full of information that fraudsters want to steal, these organizations have a data protection challenge on their hands. Keeping these diverse data sets safe and ensuring their high availability are essential for smooth educatio...
January 18, 2024
Organizer:
FedInsider Location:
Webcast
What in the World is Zero Trust - Why D...
One of the latest buzz terms being used is "Zero Trust" but what it is and why should anyone implement it. This webinar will go into the definition of what "Zero Trust" really is and why small to midsize businesses should consider some form of "Zero Trust" implementation. The "Zero Trust" framework is perfect for any organization that is working remotely or using a hybrid work model with employees working both in the office and/or remotely. If...
Cybersecurity Trends to Watch in 2024 f...
Taking cybersecurity measures is now critical for businesses to take into account in their 2024 planning. Every process must be scrutinized for potential vulnerabilities. Join CompTIA’s VP of Cybersecurity Programs, Wayne Selk, as he dives into the vulnerabilities that you need to address this year and key trends we’ll see in 2024. Wayne will also walk through CompTIA’s latest findings in their State of Cybersecurity for 2024...
Human Hacking: Protect Your Organizatio...
Are you confident in your employees’ ability to withstand social engineering attempts? From tricking an employee into buying $500 worth of virtual gift cards to filling the systems of Las Vegas casino hotels with ransomware! The human element is a critical piece of your cybersecurity strategy because it is your employees and staff who could fall victim to a phishing attack and give threat actors full admin-level access to your systems! T...
Defense Health Agency- Locking Down You...
How many times have you wished you could grab a cup of coffee with an expert that intimately knows the Defense Health Agency/Military Health Service, answer your questions, connect the dots and provide you with the roadmap to position your company to win new business? This is your chance to grab that cup of coffee and join us for our new GOVTECH CONNECTS series, Coffee Talk, an exclusive, industry-only event tailored for senior growth-minded e...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.