The Definitive Red Hat Enterprise Linux...
Join Red Hat for an in-person workshop in Reston, VA to get hands-on with Red Hat Enterprise Linux 10 (RHEL 10), the most advanced release yet. Flipp Bunts, our featured trainer, has over 20 years of experience in designing highly-available Linux clusters and is know for his work in architecting classified networks, implementing continuous monitoring and migrating legacy Unix systems to Linux. During this training, Flipp will take the stage to...
SANS Ransomware Summit 2025
Ransomware attacks are widespread because they are highly profitable and effective for cybercriminals. Many organizations are unprepared for such attacks, leading to serious financial and operational damage. The SANS Ransomware Summit brings together cybersecurity professionals to share insights on preventing, detecting, and recovering from ransomware. The Ransomware Summit will explore these topics:Ransomware intrusion emulationRansomware ini...
Navigating Geopolitical Dynamics for Cl...
With the evolving landscape of the cloud services market, U.S. policy shifts are challenging non-U.S. clients to find alternatives to U.S.-based cloud providers. Product leaders need strategic insights to help clients balance the risks of U.S. interference with the innovative value offered by leading cloud services. Many organizations struggle with ensuring data privacy and adopting cutting-edge innovations amidst these complexities. Join this...
May 14, 2025
Organizer:
Gartner Location:
Webcast
Law Enforcement and Public Safety (LEAP...
Artificial intelligence (AI) is rapidly reshaping criminal justice, law enforcement, and public safety. Criminals are increasingly adopting AI technologies, such as adaptive malware and deep-fake tools to execute sophisticated cyberattacks and evade detection while posing significant challenges to public safety. Conversely, law enforcement and public safety agencies leverage predictive analytics and machine learning to analyze vast datasets, i...
Enterprise Education Series: Intro to SD-WAN
Join us for the Intro to SD-WAN webinar and earn one Continuous Learning Point (CLP) for attending. The Enterprise Education Series is designed to:Expand your awareness of innovative contract solutionsHelp you drive transformative outcomesProvide you with direct GSA points of contact for support and additional educationThis event will be a solutions-focused virtual learning “power hour” to bring educational content directly to you...
CSfC Conference
For a wide range of solutions providers, CSfC will open a large and reliable new market: US Government customers within the National Security Systems (NSS) who need the latest commercial technology solutions to achieve their mission objectives. The National Security Agency’s (NSA) Commercial Solutions for Classified (CSfC) Program was created to enable rapid certification of these products for classified use. But achieving and maintainin...
State of Ransomware and Data Extortion:...
Ransomware has evolved into one of the most disruptive threats organizations face today, disrupting critical systems, endangering lives, and costing billions of dollars in losses. Ransomware operators are organized, well-funded, and adept at bypassing security controls even at organizations with the most mature security programs. We will discuss:The state of the ransomware ecosystem and the leading threat actors in the spaceThe marked increase...
April 24, 2025
Organizer:
SINET Location:
Webcast
Transitioning from FIPS 140-2 to 140-3:...
NIST FIPS 140, Security Requirements for Cryptographic Modules, applies to technology products performing data encryption that the federal government purchases. Technology providers must obtain FIPS 140 certification that the cryptography in their products has been tested and approved for government use. As the U.S. federal government moves from FIPS 140-2 to FIPS 140-3, these providers must navigate evolving cryptographic validation requireme...
CTO Sessions: Best Practices for Implem...
Quantum computing’s potential computational power will render today’s widely-deployed encryption algorithms obsolete. Both the National Security Memorandum on Promoting US Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems and Quantum Computing Cybersecurity Preparedness Act stress the need to update IT infrastructure today to combat the quantum threat. Both policies emphasize the use of cryp...
Centralized Fine-Grained Access Control...
Discover how a singular platform can centrally enforce ABAC, FPE Encryption, and real-time User Activity Monitoring for Collibra, home-grown and COTS applications, and analytics—all without code changes! Trusted by Fortune 500 companies, U.S. and Swiss Banks, and government agencies, SecuPi enhances security, privacy, and compliance. During the webinar, attendees will learn:Restricting Access in Collibra: Learn how to control assets, res...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.