Qualys Public Sector Cyber Risk Conference
In the face of escalating attacks spanning broader scope, scale, and attrition, today’s public sector cybersecurity leaders must transition from simple compliance to more comprehensive risk management. Join us on May 21st for the Qualys Public Sector Cyber Risk Conference as we gather leading minds from across the public sector to delve into emerging cybersecurity issues. Throughout the summit, these leaders will discuss next-generation...
May 21, 2024
Organizer:
GovExec 360 Location:
Washington, DC
Google Workspace California Webinar Series
In this webinar series, we will cover the following topics and more: Google Workspace for Government How Google Does Security GenAI - Realistic ways to make it work for you
From Data to Decisions in Tableau Pulse...
Tableau Pulse is a reimagined data experience that makes data more accessible to everyone regardless of their expertise with data visualization tools. Join us to learn how to leverage the power of Tableau AI to deliver data in ways that are more personalized, contextual and smart. During this webinar, attendees will: Learn what Tableau Pulse is and how it can fit into your daily workflow Understand how to get ready by defining metrics and bui...
Red Hat Training Webinar Series
In a rapidly evolving world, where AI and Machine Learning (ML) are essential, modern IT leaders need a clear understanding of their roles in shaping the future. Join Red Hat online for real-world use cases and examples of how your agency can utilize Red Hat Services to help navigate the ever changing ecosystem of AI/ML. This webinar, led by the Red Hat Training and Certification team, will cover: A brief overview of Artificial Intelligence an...
Microsoft Office Offensive Tradecraft
During this webinar attendees will learn about: Recent developments such as Mark-of-the-Web Microsoft security controls including trust settings and decision flows Tactics for gaining initial access, lateral movement, and long-term persistence
VETS 2 DPA Training
Who Should Attend: All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how the VETS 2 GWAC can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against the VETS 2 GW...
Migrate, Optimize, and Modernize with V...
Explore the capabilities of VMware Cloud (VMC) on Amazon Web Services (AWS) to facilitate faster and more cost-effective cloud workload migration for your agency. Experience the transformation of applications and infrastructure services using familiar tools and increased scalability. Join us at our upcoming in-person workshop, where subject-matter experts will dive into the following topics: Accelerating datacenter evacuations with VMC on AWS...
Mexico Manufacturing & Trade Operations...
Mexico Manufacturing & Trade Operations: A Discussion of the Opportunities and Challenges Arising Under the USMCA Mexico has long been an important node in global manufacturing and supply chain networks. While the rise of China diverted some of the trade and investment that would otherwise have gone to Mexico in the 2001-2017 time period, the passage of the USMCA, considered in conjunction with the ongoing U.S.-China trade war, has had the...
Modernizing Security: Simplifying Zero...
Government security teams today are under constant siege. Not only are they responsible for defending their organizations, but they are also tasked with complying with new and in-depth mandates that span Zero Trust, logging and most recently, artificial intelligence (AI). Leading agencies such as Oak Ridge National Laboratory are at the forefront of security innovation modernization. They achieve this by embracing next-generation solutions tha...
DoD: Embracing Continuous Monitoring
Federal cyber leaders are tasked with the challenge of balancing active defense efforts, particularly when the U.S. is involved in international conflict, with building an infrastructure secure from the individual device all the way to enterprise environment. To do all of that, defending their networks and building for the future, DoD leaders must prioritize continuous monitoring of their cyber systems to address hidden vulnerabilities to addr...
May 21, 2024
Organizer:
FedInsider Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.