Back to Search Begin New Search Save Search Auto-Notify
The 3 Secrets to Future-proof Your IT O...
Times of crisis require CIOs and IT leaders to strengthen enterprise adaptability and resilience. Faced with an ever-widening chasm between their ability to deliver outcomes and the enterprise’s swelling demand for digital, CIOs also must become a force multiplier to bridge the execution gap. This free webinar highlights key areas for unlocking hidden opportunities that will help Asia-Pacific executive leaders quickly pivot their enterp...
December 7, 2022
Organizer: Gartner
Location: Webcast
Add Favorite
Backup Exec and Lenovo Partner Enableme...
The Backup Exec and Lenovo Meet-in-the-Channel (MitC) program gives our partners a new way to sell Backup Exec software along with Lenovo hardware. The latest version of Backup Exec comes pre-loaded and ready to be deployed, streamlining, and simplifying the implementation process for users. Lenovo platforms have been optimized for the best performance of Backup Exec which makes this offering a simple and compelling package for new users.Durin...
December 7, 2022
Organizer: Veritas Technologies
Location: Webcast
Add Favorite
Build vs. Buy: Is Managing Customer Ide...
It’s a login box. How hard can it be? Every team building a web or mobile app faces the same dilemma when adding new functionality: Should we build it in-house or use out-of-the-box services?. And, more often than not, authenticated user access sparks the debate. For those that opt to build Customer Identity solutions in house, the logic looks like this: Our developers can handle customer identity. It’s a login box. How hard could...
December 7, 2022
Organizer: Okta
Location: Webcast
Add Favorite
Proactively Respond to the Cloud's Chan...
Tune into this webinar session presented by Deloitte's Aaron Brown and Curt Aubley to learn more about these three best practices to help manage common, evolving threats that emerge from cloud use. Taking a holistic approach to address observability prior to deployment- Utilizing DevSecOps to avoid the introduction of vulnerabilities during development by detecting, containing, and remediating pre-deployment. All of these actions are necessary...
December 7, 2022
Organizer: Deloitte
Location: Webcast
Add Favorite
Top Threats to the Cloud for the Business
The cloud landscape is complex with different threats, risks, and vulnerabilities that can overwhelm a business and its security teams. An annual report released by CSA tracks the top concerns reported by security professionals to understand how threats and breaches impact the business. Organizations must prioritize how cloud security affects the organization, break down recent cyber attacks, and implement controls that protect the organizatio...
December 7, 2022
Organizer: BrightTALK
Location: Webcast
Add Favorite
Identity and Access Management: The Fir...
Join Bob West, Chief Security Officer at Prisma Cloud, to learn about how Prisma® Cloud can address the cloud threats in your enterprise. This event explores how to operationalize the insights in the latest Unit 42 Cloud Threat Report.
December 7, 2022
Organizer: Palo Alto
Location: Webcast
Add Favorite
Warfighters in Action: Colonel Ernesto...
Join us Dec. 7 at 11 a.m. EST for a fireside chat with Commander Col. Ernesto DiVittorio and AFA President-CEO Lt. Gen. Bruce Wright, USAF (Ret.), to hear the latest from the 366th Fighter Wing. Serving as a diverse operational fighter wing equipped with F-15E and F-15SG fighter aircraft, the 366th Fighter Wing is comprised of 4,200 military and civilian members that support 18 squadrons including a squadron comprised of members from the Repub...
December 7, 2022
Organizer: Air Force Association
Location: Webcast
Add Favorite
Data Fabric Implementation
According to a new report by Market Connections, 61-percent of Department of Defense respondents are at least somewhat familiar with the DoD Data Strategy and 60-percent of all respondents are at least somewhat familiar with the Federal Data Strategy. Furthermore, seventy-percent of respondents report that their organization has started implementing a data strategy of their own. But modernizing security architectures, a lack of internal resour...
December 7, 2022
Organizer: IBM
Location: Webcast
Add Favorite
Implementing a Zero Trust Architecture...
Agency zero trust policies and strategies are in place. Now it’s all about implementation and defining success. During this exclusive webinar, moderator Jason Miller will discuss zero trust in 2023 and beyond with agency and industry leaders. Learning objectives: Current state of zero trust The pillars of zero trust Measuring success of zero trust strategy
December 7, 2022
Organizer: Federal News Network
Location: Webcast
Add Favorite
Don't Lag Behind: 3 Reasons to Start Yo...
Despite its prevalence in our daily life, cloud technology can feel like a daunting topic, especially if you’re not an expert. But cloud technology is here to stay and its positive impact on the public sector is undeniable, sentiments reinforced by the federal government’s decade-plus commitment to moving agency operations to cloud-based tools, having recognized how moving to the cloud makes services more efficient and reduce stres...
December 7, 2022
Organizer: GovLoop
Location: Webcast
Add Favorite
Back to Search Begin New Search