Carahsoft Cybersmart Federal Day 2024
Cybersecurity has always contended with evolving threats. As the internet has become more embedded into social and economic life and handheld devices become ubiquitous, bad actors have devised new attacks to capitalize on new vulnerabilities. Join Carahsoft and FedInsider on January 25th, as thought leaders from government and industry discuss how the continuing evolution of IT and its growing penetration into every corner of society presents...
2024 Vision: Elevating Federal Security...
In today’s digital landscape, where cloud applications play a central role in every enterprise and artificial intelligence fuels rapid innovation, the need for a sophisticated cybersecurity strategy is paramount. With cloud applications at the heart of every digital enterprise and AI-led development certain to accelerate innovation, organizations require an intelligent cloud approach to security that’s intuitive for users and highl...
January 25, 2024
Organizer:
ATARC Location:
Webcast
Private 5G's Role in Optimizing and Tra...
As cybersecurity concerns and connectivity challenges grow in the public sector, so does the need for more protected, seamless communication. A cellular network with dedicated access to private resources can support classified and confidential applications. Whether it’s hybrid cloud or on-premise, on the battlefield or in a hospital, public sector leaders can facilitate efficient communication by leveraging wireless technologies like pri...
Washington DC SASE Summit
Networking, Security, and Zero Trust: A Federal & Enterprise Evolution The modern IT landscape is complex, characterized by the intricate interplay of Federal and commercial sectors, each with unique challenges and requirements. Join us to discuss how Netskope SASE framework provides an environment of enhanced security, efficiency, and innovation, by offering tailored solutions adept at meeting the nuanced demands of both sectors. We will...
January 24, 2024
Organizer:
Netskope Location:
Washington, DC
Alliant 2 DPA Training
All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how Alliant 2 can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against Alliant 2. This webinar is not open to...
The Secret to Effective Security Operat...
Arctic Wolf’s CTO, Sam McLane, will host our conversation with Retired FBI Supervisory Special Agent, Scott Augenbaum, who spent over three decades responding to thousands of Cyber Crime incidents. As one of the first FBI agents to investigate computer crime at the Federal Bureau of Investigation, Scott has seen firsthand the devastating effects that cybercrime has on organizations. Among sharing some of the secrets to effective security...
Harnessing Peer-to-Peer Engagement and...
In today's digital-first world, establishing an engaging virtual learning environment is both essential and demanding. It's no longer sufficient to merely reach learners, regardless of their location; trainers must also craft personalized and captivating digital learning content. Leverage hybrid learning to create a unified learning experience with content that’s available in any format across devices, letting users learn anywhere, at an...
Elastic Enablement Day at Offutt AFB
Commanders and warfighters worldwide are using Elastic to effectively monitor and gain insights into distributed legacy systems. Elastic allows them to aggregate all observability data in one solution, and break down silos by bringing together application, infrastructure, and user telemetry data for end-to-end observability. Join Elastic experts onsite to learn more about how Elastic can converge metrics, logs, and traces, to deliver unified v...
Securing Networks: AI and Automation in...
With evolving technology comes evolving cyber threats. How are agencies securing networks and staying ahead of the trends? Join moderator Justin Doubleday, and agency and industry leaders on Jan. 24 at 2 p.m. to learn how agencies are implementing artificial intelligence and machine learning tools to enhance cybersecurity initiatives. Learning objectives: Securing networks with AI and automation Identity and access management The future of AI/...
Zero Trust is Needed to Win the Cyber War
Zero trust revolutionizes network security architecture because it is data-centric and designed to stop data breaches. While that is its primary purpose for government, it also increases agility for modern networks that traditional network designs can’t emulate. It has been almost two years since the Office of Management and Budget issued its federal zero trust architecture strategy, which set out specific goals for agencies to achieve b...
January 23, 2024
Organizer:
FedInsider Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.