Personal Influence: Establish Your Lead...
The importance of technology leadership became a driving priority for many organizations. Your leadership style, the way you engage with your teams, peers, suppliers, executives, and even your approach to corporate politics are determined by your personal brand. Knowing your brand and your approach can tell you who you are as a leader. Knowing how to use and grow it will show everyone else. Join this free leadership webinar to identify your ow...
December 7, 2022
Organizer:
Gartner Location:
Webcast
Ansible Automates 2022
Ansible® Automates 2022 is an in-person and live stream conference hosted by Red Hat®. The right IT automation solution can unify teams and processes across an organization, ultimately transforming the way IT is delivered. Red Hat Ansible Automation Platform supports extensive possibilities and is designed with hybrid cloud infrastructure in mind. It is a flexible, scalable, and multifaceted automation solution that works across your e...
December 7, 2022
Organizer:
Red Hat Location:
New York, NY
Scale Your Cyber Resiliency with Threat...
Anomali has made its mark delivering threat intelligence-powered detection and response with its portfolio of solutions: Match, ThreatStream, and Lens. We've expanded upon that leadership position by introducing The Anomali Platform, a high-performance, big data, cloud-unified threat detection and response solution.Join us on December 7th for a threat intelligence webinar where Mark Alba, Chief Product Officer, and Scott Dowsett, Field CTO of...
Small Business Event - 6th Annual HUD I...
The U.S. Department of Housing and Urban Development’s (HUD) Office of Small and Disadvantaged Business Utilization (OSDBU) is hosting the Department’s 6th Annual HUD IT Industry Day. This virtual industry day is scheduled for Wednesday, December 7, 2022 from 10am - 12pm (ET). This will be a Microsoft TEAMS event. This event will provide businesses a chance to hear from HUD's leadership about their organization's IT Portfolio, visi...
Overview of RFIs, RFPs, and RFQs
Learn the key elements of Requests for Information (RFIs), Requests for Proposals (RFPs), and Requests for Quotes (RFQs). Description: Join Information Technology Category (ITC) Multiple Award Schedule (MAS) contracting personnel for a live training overview on Requests for Information (RFIs), Requests for Proposals (RFPs), and Requests for Quotes (RFQs). The training will also provide an open forum for ITC MAS contract holders to seek additio...
ArcGIS Pro Geospatial Environment with...
ArcGIS is the world's leading Geographic Information System (GIS) software and analytics platform from Esri. Join us to learn how desktop virtualization for ArcGIS Pro with Microsoft's Azure Virtual Desktop can significantly improve performance, maintainability, and reduce costs of your GIS environment.During this webinar, we will cover topics including:The benefits of software virtualization in the cloudHow Azure Virtual Desktop has been used...
Microsoft Azure Virtual Training Day: L...
Join us at Microsoft Azure Virtual Training Day: Linux OSS Database Migration to learn how to plan, manage, and optimize your cloud migration. Explore how to assess your existing on-premises environment, optimize your cloud migration, and manage your virtual machines, applications, and data. Plus, you’ll learn how to migrate open-source applications and data workloads at scale to take full advantage of Azure. Who should attend: IT profes...
December 7, 2022
Organizer:
Microsoft Location:
Virtual
Security Talks 2022
Learn how to trust nothing & detect everything in your environment with Google Cloud. The year’s final Google Cloud Security Talks is designed to give you the assurance you need heading into 2023 that trusting nothing and detecting everything is achievable with modern security operations approaches and actionable threat intelligence at your side. Hear from the experts and explore how Google’s own security team operates, discove...
Application-Induced Cloud Security Issu...
When it comes to securing cloud usage, misconfigurations can arise for many reasons and stem from a number of sources. One particularly well-traveled road for the origination of security issues is through application development. Specifically, situations where changes made during development lead to undermined security, the introduction of vulnerabilities, or other non-optimal security outcomes. Fortunately, by working together with developmen...
The 3 Secrets to Future-proof Your IT O...
Times of crisis require CIOs and IT leaders to strengthen enterprise adaptability and resilience. Faced with an ever-widening chasm between their ability to deliver outcomes and the enterprise’s swelling demand for digital, CIOs also must become a force multiplier to bridge the execution gap. This free webinar highlights key areas for unlocking hidden opportunities that will help Asia-Pacific executive leaders quickly pivot their enterp...
December 7, 2022
Organizer:
Gartner Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.