Securing Our States: Core Pillars of St...
Forward-thinking state and local governments are participating in the State Risk and Authorization Management Program (StateRAMP) as they build out a robust and secure IT infrastructure. Modeled after the federal government's FedRAMP, the nonprofit membership organization uses independent audits and continuous monitoring to verify that cloud services satisfy standardized state government security requirements and can be used by agencies in mul...
Workforce Identity Maturity: Top 3 Tact...
Individuals responsible for Identity management today are caught in a whirlwind: the number of identities to manage is growing , hybrid work is here to stay, and there are an increasing number of cloud services employees need access to. Organizations aligned to Identity management best practices cite an increased organizational agility, greater employee productivity, and a strengthened cybersecurity posture as a result. Given this success, wha...
June 26, 2024
Organizer:
Okta Location:
Webcast
Transforming Workflows for the DoD: Ser...
Join ServiceNow as we dive into the transformative potential of integrating ServiceNow solutions seamlessly with Microsoft 365 (M365) within the secure National Security Cloud on Azure IL5. Designed specifically for the Department of Defense (DoD), this session unveils how these powerful integrations can revolutionize your workflows, collaboration, and security measures. Join us to gain invaluable insights on: Streamlined workflows: Discover...
Part 2: Preventing Avoidable Cloud Wast...
In the adoption phase of the cloud journey, organizations suffer from a lack of visibility and tracking around what developers can provision, which can lead to over-provisioning and idle or underused resources. In part two of our webinar series, Optimize Cloud Spend with HashiCorp Terraform, you’ll learn how Terraform helps you avoid overspending in the adoption phase of your cloud journey. We’ll cover: What the adoption phase of t...
June 27, 2024
Organizer:
HashiCorp Location:
Webcast
Protect Your Organization From Ransomware
Did you know 76% of organizations have experienced an event in the last two years that required a disaster recovery (DR) plan? By 2025, 75% of organizations are predicted to be hit by ransomware. Are you confident your organization is protected? Avoid cybersecurity attacks to gain confidence and peace of mind with VMware Cloud Disaster and Ransomware Recovery! It is on-demand and is delivered as an easy-to-use vendor-managed SaaS solution, wit...
Securing and Optimizing the Modern Deve...
In software development, efficiency and security are essential to innovation and operational success. As agencies and organizations have moved their testing and production to the cloud, development environments often lag, using outdated systems that reduce productivity and compromise security.Join us online to learn how Coder helps organizations create a centralized development network, which improves security and control and provides develope...
CTO Sessions: How-to Guide for Enhancin...
Sensitive data stored in HPE deployments must be encrypted edge-to-cloud. For encryption to successfully secure sensitive data, the cryptographic keys used to encrypt/decrypt data must be secured, managed and controlled by the data owner. Thales TCT’s CipherTrust Data Security Platform unifies data encryption and unprecedented granular access controls with centralized key management—all on a single platform. This results in fewer r...
The Top 10 Mistakes to Avoid in Your Cl...
Executive leaders need a defined process to maximize cloud benefits and deliver business outcomes. Many organizations think they have a working cloud strategy, and some lack one altogether. They often consider IT requirements without consulting other departments across the organization. Many organizations often operate under the false assumption that a cloud strategy is the same as a cloud implementation plan or a data center strategy. Join th...
July 9, 2024
Organizer:
Gartner Location:
Webcast
Customer Identity Cloud: Roadmap and Fe...
Okta Customer Identity Cloud, powered by Auth0 enables secure and seamless digital experiences that businesses and customers expect. Join us for a sneak peek of what’s coming next for Customer Identity Cloud, including innovative features for customer engagement and growth. We will first cover a brief synopsis of our recent releases then dive into upcoming product capabilities which help you unlock the full potential of your consumer and...
July 16, 2024
Organizer:
Okta Location:
Webcast
How GSA Can Help Your Cloud/Software Sm...
Is your small business ready to get in the cloud/software business with GSA? Attend our virtual event Wednesday, July 17, 2024, to learn how your cloud/software small business can get on the GSA Schedule. Cloud computing and software acquisition is a major topic for government agencies, and we want to give small businesses the chance to learn how to become one of our Best-in-Class vendors to support various agency needs. Register now to attend...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.