Back to Search Begin New Search Save Search Auto-Notify
How to Secure Your Agency's Identities...
A zero trust approach to securing your infrastructure is fundamental to reducing risk — and securing identities lies at the core of a successful zero trust strategy. Together, BeyondTrust and Ping Identity deliver the key components of zero trust including privileged identity security, using multi-factor authentication and SSO, with complete visibility and analytics. Join us on June 18 at 1:00pm ET for a tech talk and live demo to see ho...
June 18, 2024
Organizer: BeyondTrust Government Team at Carahsoft
Location: Webcast
Add Favorite
Women in AFCEA Virtual Happy Hour: June 2024
Join Women in AFCEA for our popular virtual happy hour! Switch off from work, grab a drink, and join your fellow women professionals for a positive chat about life in the IT/Cyber/Global Security industry. This month we'll be chatting with WIA marketing lead, Ariel Glassman, about how to optimize your LinkedIn profile and how to make it work for YOU!
June 18, 2024
Organizer: AFCEA International
Location: Webcast
Add Favorite
Automate Technology Lifecycle Managemen...
Join us to learn about how ServiceNow can manage all your hardware, software, and cloud IT assets from a single platform. We will explore how you can automate at every stage of the IT asset lifecycle at scale while controlling costs and minimizing licensing and leasing risks. Software Asset Management and Hardware Asset Management will be highlighted in this session, providing you with a comprehensive overview.
June 18, 2024
Organizer: ServiceNow
Location: Webcast
Add Favorite
Ransomware Realities � Beyond the Basics
Ransomware attacks are no longer just a headline—they're a daily reality for public sector organizations. Join us for an in-depth webinar exploration of ransomware, where we'll peel back the layers and reveal the threats and practical defenses. Why You Can't Miss This Webinar:Behind-the-Scenes Insights: Explore exclusive research on ransomware gangs, their motivations, and their connections to global events.Early Detection Tactics: Learn...
June 18, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
FDA ODT & Centers: New Acquisition Stra...
Join us on Tuesday, June 18, 2024 as we engage with Senior Executive Leaders from the FDA's Office of Digital Transformation and the FDA Centers to explore the details of FDA's new IT Acquisition Strategy and Implementation Plan, Opportunity Roadmap for FY24 and FY25, and Small Business Set Asides vs. Unrestricted for Large Acquisitions. These discussions will feature ODT and FDA Center Executives and how industry can prepare to work with the FDA!
June 18, 2024
Organizer: GovTech Connects
Location: North Bethesda, MD
Add Favorite
Security Operations Summit
From a constantly evolving threat landscape and expanding attack surface to a significant shortage of skilled professionals, many security teams face serious challenges. Today’s cybersecurity threats are more sophisticated and pervasive, and threat actors typically have plenty of time to achieve their objectives, particularly now with AI-driven tools at their disposal. With AI, threat actors have another “easy” button for car...
June 18, 2024
Organizer: Fortinet
Location: Webcast
Add Favorite
Decoding Digitalization Defense: Friend...
The adoption and implementation of digitalisation is well underway in most of society, with defence organisations at various stages of the transition. However, are any of them losing out due to the speed of adoption? Given the “new normal” in warfare we are witnessing in Ukraine, what is their plan to create and maintain information superiority without digitalisation? Defence agencies’ traditional working practices are battle...
June 18, 2024
Organizer: AFCEA Pocono | AFCEA Europe
Location: Webcast
Add Favorite
Engineering Cybersecurity Mitigations f...
Large water utilities are looking to gain efficiencies by adopting new distributed edge devices and digital transformation initiatives incorporating the latest machine learning and AI algorithms. Meanwhile, small to mid-size municipalities, are wanting to maintain their reliability without increasing their rate-base. Yet, a worsening threat environment looms over North American and European operators. Increasingly sophisticated criminal ransom...
June 18, 2024
Organizer: Waterfall Security
Location: Webcast
Add Favorite
Building Responsible GenAI Strategies for HR
Generative AI is not just about technology—it's about transforming HR practices. Register for this session, Building Responsible GenAI Strategies for HR, and gain in-depth insights into the ways you can harness the power of GenAI in human resources while ensuring ethical compliance. You’ll hear from our experts, Allan Sabol and Kim Thomson, about best practices in using GenAI in HR, such as:Maintaining strict ethical and privacy st...
June 18, 2024
Organizer: ServiceNow
Location: Webcast
Add Favorite
Event-Driven Ansible Workshop + Getting...
As a part of Red Hat� Ansible� Automation Platform, Event-Driven Ansible can process events containing discrete intelligence about conditions in the IT environment, determine the appropriate response to the event, then execute automated actions to address or remediate the event. This workshop will demonstrate Event-Driven Ansible and how it provides the event-handling capability needed to automate time-consuming tasks and respond to changing c...
June 18, 2024
Organizer: Red Hat
Location: Boston, MA
Add Favorite
Back to Search Begin New Search