Hands-on Workshop: Defend Yourself Agai...
Is the risk of hardcoded credentials and exposed API keys threatening your security posture? Join us for an instructor-led workshop that will provide in-depth foundational knowledge of Vault and the principles of dynamic, identity-based secret management. Register now to learn how to deploy and operate Vault, the basics of effective snapshot and restore methods, basic Static Secrets management, Shamir seal type/unsealing and auto-unsealing for...
Beyond the API: Unlock AI Agent to Agen...
This webinar will discuss how the MuleSoft Agent Fabric solves fragmentation, security risks, and growing complexity by turning scattered agents into a coordinated, secure digital workforce. With a central registry to discover agents, intelligent brokering to orchestrate them, built-in governance to enforce guardrails across every agent consistently, and visualization to provide real-time oversight—you can scale your agentic enterprise w...
Transitioning to GitLab for Modern Plan...
IT leaders at the Department of War (DoW) are in the throes of major DevOps vendors phasing out on-premise tolls, pushing agencies toward cloud-only deployments. With this transition comes potential compliance requirement violations, inflated costs and eroded control over mission-critical information. Join GitLab on December 4th for an exclusive webinar where we'll review how your team can seamlessly migrate from legacy platforms with GitLab's...
From Chaos to Clarity: Mastering Applic...
Government agencies face mounting pressure to optimize their application portfolios due to rising costs, shadow IT, and the increasing complexity of emerging technologies and fragmented development practices. Application rationalization is no longer a one-time exercise; it’s a continuous discipline that requires alignment across people, processes, technology, and data. This session will introduce Forrester’s Application Portfolio R...
SANS 2025 Detection and Response Survey...
As cyber threats grow in complexity and frequency, organizations' strategies for detection and response must continuously evolve. The SANS 2025 Detection and Response Survey webcast will delve into the current state of cybersecurity operations, questioning whether the heavy emphasis on endpoint detection is creating new blind spots. By concentrating primarily on endpoints, organizations may narrow their scope and overlook threats emerging from...
Washington Innovation Day Featuring Sal...
Join Salesforce and innovators from across Washington for a full day of learning, networking, and inspiration. Washington Innovation Day will showcase customer stories, demonstrations, and thought leadership designed to spark ideas and share best practices in digital transformation. Throughout the day, you'll connect with peers, hear from leaders who are shaping the future of technology in the region, and explore how Salesforce solutions a...
Cyturus - The Day After Compliance Series
Compliance doesn’t end with certification — it’s an ongoing commitment to security, alignment and resilience. For organizations, sustaining CMMC compliance requires more than technology; it demands continuous improvement across people, processes and operations. Join us for this expert-led Cyturus session to learn how leaders can maintain compliance, strengthen cybersecurity maturity and protect sensitive data in an evolving t...
Addressing Security Holes in Air Gapped...
As IT and security deployments migrate to the cloud, security gaps in air-gapped systems can be created unless attention focuses on threats such as data transfer from external storage media – for example, USB devices. Paradoxically, many agencies continue to maintain critical systems and data on air-gapped servers or on systems running end-of-life operating systems. The U.S. Department of War maintains critical air-gapped systems even as...
December 3, 2025
Organizer:
FedInsider Location:
Webcast
Certificate of Cloud Security Knowledge...
Certificate of Cloud Security Knowledge v5 | Lectures and Labs Get Certified in Cloud Security with CCSK v5 Plus Certification Training Advance your career and strengthen your cloud security expertise with CCSK Certification Training—a globally recognized certification from the Cloud Security Alliance (CSA). Our comprehensive CCSK v5 Plus Training course fully prepares you for the Certificate of Cloud Security Knowledge (CCSK) exam with...
Intelligent Data Infrastructure: Poweri...
Federal Civilian agencies face mounting pressure to modernize IT infrastructure, adopt AI responsibility, strengthen cyber resilience, and embrace the cloud - all while improving efficiency, reducing costs, and protecting mission integrity. You're invited to join NetApp and Carahsoft for a webinar series designed to equip agencies with practical strategies, proven solutions, and expert insights for accelerating transformation across critical m...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.