Back to Search Begin New Search Save Search Auto-Notify
The Definitive Red Hat Enterprise Linux...
Join Red Hat for an in-person workshop in Reston, VA to get hands-on with Red Hat Enterprise Linux 10 (RHEL 10), the most advanced release yet. Flipp Bunts, our featured trainer, has over 20 years of experience in designing highly-available Linux clusters and is know for his work in architecting classified networks, implementing continuous monitoring and migrating legacy Unix systems to Linux. During this training, Flipp will take the stage to...
July 15, 2025
Organizer: Red Hat Government Team at Carahsoft
Location: Reston, VA
Add Favorite
SANS Ransomware Summit 2025
Ransomware attacks are widespread because they are highly profitable and effective for cybercriminals. Many organizations are unprepared for such attacks, leading to serious financial and operational damage. The SANS Ransomware Summit brings together cybersecurity professionals to share insights on preventing, detecting, and recovering from ransomware. The Ransomware Summit will explore these topics:Ransomware intrusion emulationRansomware ini...
May 30, 2025
Organizer: SANS Institute
Location: Virtual
Add Favorite
Navigating Geopolitical Dynamics for Cl...
With the evolving landscape of the cloud services market, U.S. policy shifts are challenging non-U.S. clients to find alternatives to U.S.-based cloud providers. Product leaders need strategic insights to help clients balance the risks of U.S. interference with the innovative value offered by leading cloud services. Many organizations struggle with ensuring data privacy and adopting cutting-edge innovations amidst these complexities. Join this...
May 14, 2025
Organizer: Gartner
Location: Webcast
Add Favorite
Law Enforcement and Public Safety (LEAP...
Artificial intelligence (AI) is rapidly reshaping criminal justice, law enforcement, and public safety. Criminals are increasingly adopting AI technologies, such as adaptive malware and deep-fake tools to execute sophisticated cyberattacks and evade detection while posing significant challenges to public safety. Conversely, law enforcement and public safety agencies leverage predictive analytics and machine learning to analyze vast datasets, i...
May 13, 2025
Organizer: AFCEA Bethesda
Location: Washington, DC
Add Favorite
Enterprise Education Series: Intro to SD-WAN
Join us for the Intro to SD-WAN webinar and earn one Continuous Learning Point (CLP) for attending. The Enterprise Education Series is designed to:Expand your awareness of innovative contract solutionsHelp you drive transformative outcomesProvide you with direct GSA points of contact for support and additional educationThis event will be a solutions-focused virtual learning “power hour” to bring educational content directly to you...
May 7, 2025
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
CSfC Conference
For a wide range of solutions providers, CSfC will open a large and reliable new market: US Government customers within the National Security Systems (NSS) who need the latest commercial technology solutions to achieve their mission objectives. The National Security Agency’s (NSA) Commercial Solutions for Classified (CSfC) Program was created to enable rapid certification of these products for classified use. But achieving and maintainin...
May 6-7, 2025
Organizer: Certification Conferences
Location: College Park, MD
Add Favorite
State of Ransomware and Data Extortion:...
Ransomware has evolved into one of the most disruptive threats organizations face today, disrupting critical systems, endangering lives, and costing billions of dollars in losses. Ransomware operators are organized, well-funded, and adept at bypassing security controls even at organizations with the most mature security programs. We will discuss:The state of the ransomware ecosystem and the leading threat actors in the spaceThe marked increase...
April 24, 2025
Organizer: SINET
Location: Webcast
Add Favorite
Transitioning from FIPS 140-2 to 140-3:...
NIST FIPS 140, Security Requirements for Cryptographic Modules, applies to technology products performing data encryption that the federal government purchases. Technology providers must obtain FIPS 140 certification that the cryptography in their products has been tested and approved for government use. As the U.S. federal government moves from FIPS 140-2 to FIPS 140-3, these providers must navigate evolving cryptographic validation requireme...
April 24, 2025
Organizer: SafeLogic Government Team at Carahsoft
Location: Webcast
Add Favorite
CTO Sessions: Best Practices for Implem...
Quantum computing’s potential computational power will render today’s widely-deployed encryption algorithms obsolete. Both the National Security Memorandum on Promoting US Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems and Quantum Computing Cybersecurity Preparedness Act stress the need to update IT infrastructure today to combat the quantum threat. Both policies emphasize the use of cryp...
February 20, 2025
Organizer: Thales TCT Government Team at Carahsoft
Location: Webcast
Add Favorite
Centralized Fine-Grained Access Control...
Discover how a singular platform can centrally enforce ABAC, FPE Encryption, and real-time User Activity Monitoring for Collibra, home-grown and COTS applications, and analytics—all without code changes! Trusted by Fortune 500 companies, U.S. and Swiss Banks, and government agencies, SecuPi enhances security, privacy, and compliance. During the webinar, attendees will learn:Restricting Access in Collibra: Learn how to control assets, res...
February 5, 2025
Organizer: SecuPi Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search