OpenShift v4: Enterprise Kubernetes Renewed
Red Hat OpenShift v4 includes numerous enhancements to support government agencies as they look to embrace cloud, containers and DevSecOps practices. Agencies run some of the most mission critical workloads in the world and their unique requirements help set the standard for OpenShift’s security and compliance. Join Red Hat experts and learn how to leverage the power of Red Hat OpenShift version 4 to build, deploy, scale and automate app...
Using Data and Digital Services to Improve CX
A key component of Government CX success is leveraging available agency data to develop services which deliver an optimal, measurable, targeted, personalized customer experience. In this webinar we will demonstrate how one agency is utilizing data to implement digital services to improve internal and external CX. Topics covered include how CX projects are identified, teamwork required, digital service development and implementation, and associ...
Is Your Video Distribution Protected Fr...
Our missions are increasingly at risk of being compromised and hacked. The video, audio, KVM and control data that are crucial to these missions are at risk, even in a secure SCIF environment. Situational awareness relies on video and audio data for making accurate decisions in a timely manner. Protecting that critical information from threats is paramount to a mission’s success. Learn where your video and audio data might be at risk an...
FAR - "Less Complicated" A Practical Gu...
Our comprehensive explanations will help new FAR users, while our in-depth examples will aid experienced contract professionals. This two-day offers critical information through hands-on workshops that will help both contracting and technical personnel better understand and navigate the FAR. Attendees will come away from the course feeling confident about how to apply the FAR to a variety of acquisition scenarios. Key Topics: Apply FAR Clause...
SoCal Virtual Cybersecurity Summit
Since 1999, Data Connectors has facilitated the collaboration between cybersecurity professionals and solution providers. Today, the community is comprised of over 650,000 members and 200 active vendor partners. Members enjoy informative education from industry luminaries, innovative solution providers and government agencies such as the FBI, InfraGard, US Secret Service and the Department of Homeland Security. Data Connectors brings live conf...
Defense Readiness Workshop
In October of 2020, then-Defense Secretary Esper defined defense readiness as "our military’s ability to answer the nation’s call, and to fight and win, anytime, anywhere. … The question we must answer is this: if called upon to fight tonight, are we ready?" Ensuring that answer is "yes" demands change in every corner of the Department of Defense, and especially in the technology that will power tomorrow's military. Cybersec...
Benefits of Open-Source Database in the...
It has been 11 years since the Cloud First initiative. Many agencies learned one of the keys to successful cloud migrations is providing a cloud solution that allows developers to quickly develop and deploy secure, cloud native applications using an open-source database. Having easy access to an integrated, high-performance analytics engine eliminates the need for complex, time-consuming, and expensive data movement allowing developers the abi...
Improving Enterprise Alert Management a...
In an increasingly digital world, delivering consistent service uptime has become a priority for many government customers. When issues or outages occur in an agency’s enterprise infrastructure, IT operations management teams need the correct context to prevent, manage, and resolve problems quickly so users can complete their duties and support their missions. A key ingredient in resolving issues with enterprise infrastructure is funnel...
Federal Digital Workspace in a Hybrid C...
Join Dell Technologies, VMware and Carahsoft for a virtual workshop and learn how your organization can adapt to meet the digital-first needs of people, departments, and agencies. Attendees will have the opportunity to learn the latest about Dell Technologies and VMware's hybrid cloud, end user computing, and mobility solutions to securely transform public sector processes. These technologies will create a secure digital workspace for end user...
Bots are People, Too
What do people look like when they are on your network or accessing a website or system? In most cases, a person is assigned a username, role and access rights that govern their interactions with the organization or agency. This controls what they can and cannot do within a network, application or website. But what should bots look like when they are operating on your network? Interestingly, a bot should not be treated differently: it must be...
March 10, 2021
Organizer:
ACT-IAC Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.