Google Workspace California Webinar Series
In this webinar series, we will cover the following topics and more: Google Workspace for Government How Google Does Security GenAI - Realistic ways to make it work for you
Red Hat Training Webinar Series
In a rapidly evolving world, where AI and Machine Learning (ML) are essential, modern IT leaders need a clear understanding of their roles in shaping the future. Join Red Hat online for real-world use cases and examples of how your agency can utilize Red Hat Services to help navigate the ever changing ecosystem of AI/ML. This webinar, led by the Red Hat Training and Certification team, will cover: A brief overview of Artificial Intelligence an...
VETS 2 DPA Training
Who Should Attend: All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how the VETS 2 GWAC can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against the VETS 2 GW...
Migrate, Optimize, and Modernize with V...
Explore the capabilities of VMware Cloud (VMC) on Amazon Web Services (AWS) to facilitate faster and more cost-effective cloud workload migration for your agency. Experience the transformation of applications and infrastructure services using familiar tools and increased scalability. Join us at our upcoming in-person workshop, where subject-matter experts will dive into the following topics: Accelerating datacenter evacuations with VMC on AWS...
Mexico Manufacturing & Trade Operations...
Mexico Manufacturing & Trade Operations: A Discussion of the Opportunities and Challenges Arising Under the USMCA Mexico has long been an important node in global manufacturing and supply chain networks. While the rise of China diverted some of the trade and investment that would otherwise have gone to Mexico in the 2001-2017 time period, the passage of the USMCA, considered in conjunction with the ongoing U.S.-China trade war, has had the...
DoD: Embracing Continuous Monitoring
Federal cyber leaders are tasked with the challenge of balancing active defense efforts, particularly when the U.S. is involved in international conflict, with building an infrastructure secure from the individual device all the way to enterprise environment. To do all of that, defending their networks and building for the future, DoD leaders must prioritize continuous monitoring of their cyber systems to address hidden vulnerabilities to addr...
May 21, 2024
Organizer:
FedInsider Location:
Webcast
Operational Threat Intelligence Workshop
Is your agency looking for strategic ways to operationalize your threat intelligence data? Join Trellix for an in-person workshop designed to help agencies create a defensible security architecture and leverage threat intelligence for maximum impact. With decades of operational threat intelligence experience, Trellix has a proven track record helping organizations to effectively block threats, respond to incidents, expedite remediation and mea...
Qualys Public Sector Cyber Risk Conference
In the face of escalating attacks spanning broader scope, scale, and attrition, today’s public sector cybersecurity leaders must transition from simple compliance to more comprehensive risk management – while accelerating threat response and mean time to remediation (MTTR). From leveraging artificial intelligence-enabled automation to operationalizing zero trust, from fortifying cloud environments to mitigating supply chain vulnera...
May 21, 2024
Organizer:
Qualys Location:
Washington, DC
Denver Cyber Security Summit
The Eighth Annual Denver Cybersecurity Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission gives you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
Austin Cyber Security Summit
The Second Annual Austin Cybersecurity Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission gives you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.