How to Secure Your Agency's Identities...
A zero trust approach to securing your infrastructure is fundamental to reducing risk — and securing identities lies at the core of a successful zero trust strategy. Together, BeyondTrust and Ping Identity deliver the key components of zero trust including privileged identity security, using multi-factor authentication and SSO, with complete visibility and analytics. Join us on June 18 at 1:00pm ET for a tech talk and live demo to see ho...
Women in AFCEA Virtual Happy Hour: June 2024
Join Women in AFCEA for our popular virtual happy hour! Switch off from work, grab a drink, and join your fellow women professionals for a positive chat about life in the IT/Cyber/Global Security industry. This month we'll be chatting with WIA marketing lead, Ariel Glassman, about how to optimize your LinkedIn profile and how to make it work for YOU!
Virtual Lunch N Learn with Workvivo
In this webinar you will learn how Workvivo by Zoom can personalize and automate communication and increase engagement throughout your organization. According to a research study by Gallup, agencies with a high engagement rate also have increased profits, decreased absences, and experienced a fast turnover from any form of economic challenges. Topics that will be covered include: The latest innovations created by Zoom on the communications fro...
Unmasking Cyber Shadows: Enhancing Cybe...
Meet a powerful ally in the world of Cybersecurity: Constella Intelligence's Deep OSINT investigations fueled by AI, it taps into the world's largest breach data lake collected from the surface, deep and dark web. Join us to learn how agencies can leverage deep OSINT to:Disrupt crime at its source by uncovering synthetic Identities Conduct cybercriminal identify graphing to unveil threat actors at the individual level Achieve greater scalabili...
Engineering Cybersecurity Mitigations f...
Large water utilities are looking to gain efficiencies by adopting new distributed edge devices and digital transformation initiatives incorporating the latest machine learning and AI algorithms. Meanwhile, small to mid-size municipalities, are wanting to maintain their reliability without increasing their rate-base. Yet, a worsening threat environment looms over North American and European operators. Increasingly sophisticated criminal ransom...
Event-Driven Ansible Workshop + Getting...
As a part of Red Hat® Ansible® Automation Platform, Event-Driven Ansible can process events containing discrete intelligence about conditions in the IT environment, determine the appropriate response to the event, then execute automated actions to address or remediate the event. This workshop will demonstrate Event-Driven Ansible and how it provides the event-handling capability needed to automate time-consuming tasks and respond to changing c...
June 18, 2024
Organizer:
Red Hat Location:
Boston, MA
Event-Driven Ansible Technical Workshop
As a part of Red Hat® Ansible® Automation Platform, Event-Driven Ansible can process events containing discrete intelligence about conditions in the IT environment, determine the appropriate response to the event, then execute automated actions to address or remediate the event. This workshop will demonstrate Event-Driven Ansible and how it provides the event-handling capability needed to automate time-consuming tasks and respond to changing c...
June 18, 2024
Organizer:
Red Hat Location:
Reston, VA
Red Hat OpenShift Virtualization Workshop
Join us for a hands-on workshop and overview of Red Hat® OpenShift® Virtualization. Learn about all things OpenShift Virtualization from our experts and explore the possibilities that await on your infrastructure modernization journey. A half-day experience, this workshop caters to VMadmins and infrastructure architects, with a tailored, hands-on lab that takes a comprehensive look at OpenShift Virtualization fundamentals, importing, networkin...
June 18, 2024
Organizer:
Red Hat Location:
Maryland Heights, MO
Managing Red Hat Device Edge with Ansib...
Please join Red Hat for a brief update on Red Hat® Enterprise Linux® 9 new features and a hands-on experience around management of edge devices that are deployed in protected networks where network connectivity may not always be possible. During this session, you will connect an edge device to a management platform, deploy an application, and expose the frontend of that application for public consumption. This event is targeted for a technical...
June 18, 2024
Organizer:
Red Hat Location:
San Antonio, TX
Seepage Through Earth Dams
This introductory course is designed to be a participatory, interactive workshop, which will cover the basic elements required to understand and evaluate seepage-related issues for earth dams. The course begins with providing an understanding of why seepage mechanisms in earth dams are important to dam safety. Information on seepage mechanics, including permeability and erodibility will then be presented. The presentations will then progress t...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.