Municipal Records Management with M365...
Join this webinar to to to learn how to effectively and efficiently manage your records while protecting against cyber threats and lowering your infrastructure support costs. Boosting staff productivity is key to delivering high-quality public services, including timely responses to Freedom of Information (FOI) requests, managing a growing volume of electronic documents and records, and ensuring compliance with regulations. These efforts allow...
AWS New York Lunch and Learn: Achieve C...
Is your agency struggling to manage applications both on-premises and on the cloud? Look no further than Nutanix Cloud Clusters (NC2)! Nutanix NC2 is a hybrid cloud solution that allows agencies to run their applications across both on-premises data centers and public cloud environments like Amazon Web Services (AWS). Join Nutanix, AWS and Carahsoft in Middletown, NY, for an insightful event on how Nutanix and AWS work together to provide seam...
Data Security Workshop
Government entities hold massive amounts of data within their cyber walls, and the utilization and protection of this data is a top priority for leaders across government. With an ever-evolving threat landscape and a workforce that often works outside the office, what do leaders need to do to ensure critical data — and the public’s sensitive data — are secure? What roles do emerging technologies play in the protection of such...
INTERFACE Albuquerque 2024
Welcome to INTERFACE Albuquerque 2024! IT Infrastructure is constantly changing, bringing new challenges every day. From ransomware and the latest security threats to the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations, to help educate, ad...
Data Forum 2024
Data is a key mission driver. There is no effective AI without good data. ‘Good’ here encompasses all the practices needed to maximize the use of data for the mission. These include data ingest and management, data security, making sense of data through analytics, and secure sharing of data products. Organizations that treat data as an asset rather than an expense are best positioned to unleash its potential. This forum will discus...
September 18, 2024
Organizer:
ACT-IAC Location:
Reston, VA
SBOMs: Your Key to NIST SP 800-218 Compliance
Government agencies face increasing pressure to secure their critical infrastructure from cyber threats. NIST SP 800-218 and the CISA Secure Software Development Attestation Form mandate robust software supply chain security practices. Join our Sonatype expert for this informative webinar where we will explore how understanding Software Bills of Materials (SBOMs) is essential for achieving NIST SP 800-218 compliance. Learn how to:Understand th...
Fast Time to Mission with AI: Secure Co...
Is your public sector IT team struggling with complex data queries and slow response times? SWIRL offers a groundbreaking solution that empowers users to interact with data seamlessly through natural language. By eliminating the need for data migration or complex indexing, SWIRL leverages your existing security infrastructure to deliver fast, secure and intuitive data access for organizations. Join SWIRL on Wednesday, August 28th to discover h...
INTERFACE Boise 2024
Welcome to INTERFACE Boise 2024! IT Infrastructure is constantly changing, bringing new challenges every day. From ransomware and the latest security threats to the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations, to help educate, advise,...
Dedicating Cybersecurity Resources to C...
Power grids, water systems, transportation networks and other vital services are essential to communities but lack substantial cyber defenses. Their vulnerabilities make them tempting targets, whether for nation-states or cybercriminals. For instance, the Cybersecurity and Infrastructure Security Agency (CISA) issued a warning earlier this year that a Chinese state-sponsored hacking group already has footholds in multiple networks operated by...
August 21, 2024
Organizer:
FedInsider Location:
Webcast
Using the Cone Penetrometer Test (CPT)...
Join us on August 13, from 12:00 PM - 2:00 PM Eastern for Using the Cone Penetrometer Test (CPT) for Evaluation of Dams and Levees. This webinar will comprehensively cover the Cone Penetrometer Test (CPT) from the most basic ideas to advanced topics. It will be engaging, interesting, and enjoyable to watch. The most important concepts will be fully described. There will be numerous examples of state-of-the-art evaluations. Stratigraphy evaluat...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.