Getting Started with Apigee
Learn the basics of building, managing, and protecting APIs with a practical introduction to Google Cloud’s Apigee API Management. From this session, you'll master the fundamentals of API design, create and deploy your first API proxy, and learn how to package it for developers. You will also gain hands-on experience with monitoring and analyzing your API traffic. Lastly, you’ll also learn how to organize and protect your API portf...
Gartner 2024 Leadership Vision for Secu...
Contemporary patterns for security protection do not seem fully applicable to modern realities, including public cloud computing, digital democratization, AI adoption and radical outsourcing. While Gartner identified a number of new success patterns, it will take several years to fully establish best practices for continuously evolving digital environments. As key enablers of digital business, chief information security officers (CISOs) and se...
May 31, 2024
Organizer:
Gartner Location:
Webcast
Identiverse 2024
Identiverse is where the identity security community comes together. Now in its 15th year, Identiverse is a must-attend annual event that brings together over 3,000 security professionals for 4 days of world-class learning, engagement, and entertainment. Offering more than 70 hours of top-notch content showcasing enlightening keynotes, informative panels, and hands-on masterclasses—attendees can connect with their peers during networking...
ISC2 ISSAP® Training Boot Camp
This four-day Information Systems Security Architecture Professional (ISSAP) Boot Camp is focused on teaching you the management of security programs and the ins and outs of security architecture. You’ll learn the technical aspects of security architecture, including identity and access management, infrastructure and application security, governance and compliance, security operations and security architecture modeling. This boot camp no...
May 28-31, 2024
Organizer:
Infosec Location:
Virtual
Learn The Importance Of Certifications...
Learn The Importance Of Certifications And Small Business Programs In Government Contracting REGISTER HERE Come join us weekly as we train and prepare you to capture government contracts. These sessions are designed to prepare those enrolled in the Certified Capture Manager (CCM) Program to prepare their businesses for success and to prepare them to become certified capture manager professionals. Certifications And Small Business Programs The...
Federal Strategic Sourcing Initiative O...
The Federal Strategic Sourcing Initiative for Office Supplies Fourth Generation (FSSI OS4) solution provides customers with the ability to cut costs and increase efficiencies by buying everyday supplies such as pens, paper, and printing items from a list of vendors with negotiated low prices. Attend this webinar to: Get detailed information on how to order supplies through the FSSI OS4 purchasing channel See a walk-through with GSA Advantage!...
Enterprise Technology Solutions Industry Day
The Office of Enterprise Technology Solutions (ETS), which manages GSA’s telecommunications and network infrastructure contracts, is hosting a virtual industry day to share information on its current initiatives and its goals for the future. ETS wants to hear from industry and government stakeholders to help in the development of a strategy that will determine GSA’s next acquisition initiative after the Enterprise Infrastructure So...
Emerging Leaders Inaugural Event
Join Pub K’s Emerging Leaders Division for happy hour and a lively discussion about designing your career for success.
May 30, 2024
Organizer:
Pub K Location:
Washington, DC
Embracing the As-A-Service Model in EdT...
There's an influx of new technology impacting today's education landscape. From hardware and applications to computers, printers, and tablets, these new tools offer a myriad of benefits to operational efficiency. However, they also present new questions such as: Who oversees preparing new technology deployment? How do schools troubleshoot new tools when things go wrong? How can schools budget to cover the expenses necessary to keep this techno...
Modern Identity in State Government wit...
Identity is the first pillar in the CISA Zero Trust Framework and governs who has access to the right resources at the right time. However, many organizations still struggle to implement a cohesive strategy that effectively incorporates the three core elements of identity - IAM, IGA, and PAM in today’s landscape. Join us on May 30th for a discussion surrounding Modern Identity in State Government. Okta & Active Cyber will cover the i...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.