How Government Agencies are Serving Cit...
Register now to learn how government agencies are using an ecosystem of cloud technologies to supercharge service delivery to citizens.It's not about simply choosing the one perfect platform that will solve all your problems. Today, digital business and digital work are built on cloud-enabled tech stacks drawn from an ecosystem of best-in-breed cloud services, including Box but extending to Salesforce, ESRi, ServiceNow, DocuSign, Okta and othe...
Modernize Your Agency With Red Hat Virt...
Migrate your agency to open source virtualization to reduce costs and scale your virtual IT infrastructure. Red Hat Virtualization offers complete enterprise virtualization management for servers and technical workstations on the same infrastructure. With the flexibility and openness of Red Hat Virtualization, your agency can make better use of your current infrastructure while building the foundation for future advancement. Migrate and optimi...
Alfresco Government Summit
Digital technology has changed the government landscape in every imaginable way. It's changed how employees work, the importance of security, and where value comes from. In this environment of anywhere, anytime, always-on innovation and productivity, how can your agency leverage technology to extract the most for your employees and customers?Join us for a day of discussion with government and industry experts about Advancing the Digital Flow o...
Splunk Plus Tech Week: The Adaptive Res...
So you’ve heard of Splunk and may even be using it in your IT environment, but did you know you can enhance the power of Splunk with additional technologies? Join us for our webinar series featuring Splunk and seven of their complementary technology partners, where you'll learn more about how your agency can benefit from an adaptive response approach that enables security analysts - from hunters to less skilled security staff - to better...
Secure Software Defined Data Center for...
The speed and pace of cyber threats by state and non-state actors are bombarding DoD network defenses and threatening to undermine the United States' technological military advantage. The recent elevation of US Cyber Command to a unified combatant command demonstrates the resolve to embrace the changing nature of warfare in order to maintain US military superiority across all domains and phases of conflict. This ever-changing face of war has c...
NLIT Reception-Salesforce & Google
You're invited for an evening of networking following NLIT session end on Tuesday, May 22.Continue socializing with your colleagues over drinks and hors d'oeuvres. Enjoy Nashville tradition and great live country music at Second Fiddle which is conveniently located two blocks from the Music City Center.Additionally, be sure you swing by and see us on the show floor. Google Cloud is at booth #301 and Salesforce is at booth #712.
HyTrust and VMware Breakfast & Learn
Join HyTrust and VMware in the Cabinet/Judiciary room for their Breakfast & Learn event the morning of Tuesday, May 22nd! Attendees will learn more about how HyTrust and VMware's integrated solutions allow agencies to: Define, detect, and defend sensitive and confidential dataEncrypt workloads and enable enterprise key managementEnable privileged administration access control, monitoring, and auditingAutomate compliance tasks and remedi...
BlackBerry Secure World Tour - Chicago
The mobile workforce has emerged as one of the most significant productivity advancements of modern time, unleashing endless opportunities across evolving applications and devices. But the business benefits come with a significant price: organizations must now manage large volumes of vulnerabilities introduced by a fluid landscape of endpoints. With so much at stake, key questions remain: How can organizations leverage unmanaged devices while...
Salesforce | Vertiba Webcast: Digital T...
Nearly 80% of government agencies are looking to digitally transform this year.How does your city plan to innovate?Salesforce and Vertiba are excited to discuss the findings of The Center for Digital Government Research. Over 150 IT officials, agency heads, and appointed officials across the US were given a survey to identify the key aspects of digital transformation in Government. Join our webcast to learn: What technologies cities think will...
Safeguarding Your Environment: How Mult...
A whopping 81% of data breaches involve weak or stolen credentials, and applications that use single-factor authentication are an easy target for attackers. What many IT professionals can agree on is that updating internal applications (especially legacy and custom applications) to support multi-factor authentication can be a huge--and headache-inducing--undertaking.The solution? Okta and Palo Alto Networks have collaborated to make rolling ou...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.