Cyber Solutions Fest 2023: Industrial C...
A common misconception is IT security practices can be directly applied to ICS environments. However, a “copy and paste” of traditional IT security into industrial control systems could have problematic or even devastating consequences. The consequences of modern ICS cyber-attacks can include but are not limited to widespread power grid blackouts, failure or physical destruction of critical engineering equipment, massive business f...
Federal News Network's Cyber Leaders Ex...
The release of the National Cyber Strategy culminated an already busy year for agencies as they continued to try to keep up with ever-changing cyberthreats. The White House laid out a vision of how agencies should play a leading role on all things cyber through oversight, acquisition and technology deployment. During this exclusive three-day virtual event, our editorial team will sit down with cyber leaders and experts to dive deep into effort...
Defense Tech Week 2022
DEFENSESCOOP PRESENTS DEFENSE TECH WEEK The time to revolutionize defense technology is now. Senior leaders across the Department of Defense continue to hammer home the point that to stay apace with great power adversaries, the U.S. military must invest in data-driven emerging technologies and prepare for conflict that takes place in cyberspace as much as it does on a traditional battlefield. Join influential leaders and innovators at Defense...
September 12-16, 2022
Organizer:
DefenseScoop Location:
Virtual
Red Hat Coffee Hour with Michael Tiemann
Join us on September 13 at the next Red Hat® Coffee Hour as we celebrate International Programmers' Day and honor programmers and innovators. We’ll sit down with Michael Tiemann, Red Hat’s former Vice President of Open Source Affairs, who is a true open source software pioneer. Every week, for more than 10 years, Michael Tiemann was one of the first people to welcome new associates to Red Hat. As the founder of the world's firs...
September 13, 2022
Organizer:
Red Hat Location:
Webcast
The Phish is in the Mail
Email continues to be a top vector of attack, with phishing and business email compromise (BEC) scams among the top payloads of email-based attacks. Email was designed to be open and accessible, which, unfortunately opens the door for spam campaigns, malware and phishing attacks, sophisticated targeted attacks, BEC, and privilege escalation. As risks become more serious and attackers grow more sophisticated, email security has become a multi-l...
June 14-15, 2022
Organizer:
SC Media Location:
Virtual
Red Hat Coffee Hour Series with Gene Kim
Why everyone needs DevOps now: Twenty years studying high performing organizations Join us at the next Red Hat® Coffee Hour as we talk with Gene Kim, Author of the Wall Street Journal Best-Seller, The Unicorn Project. Gene has spent over 20 years studying high-performing technology organizations. In The Unicorn Project, he attempts to frame what he’s learned studying technology leaders adopting DevOps principles and patterns in large...
May 19, 2022
Organizer:
Red Hat Location:
Virtual
2022 SolarWinds Public Sector User Group
Don’t miss out! Please join us for our virtual SolarWinds® Government and Education User Group. This interactive, online event for military, civilian, state, local, education, and contractor users of SolarWinds software will begin with a keynote presented by our President and CEO Sudhakar Ramakrishna, followed by technical updates and product demonstrations. You’ll learn about the latest in monitoring, management, and analytics...
March 22, 2022
Organizer:
SolarWinds Location:
Webcast
Red Hat Coffee Hour Series with Dr. Moo...
Doctor Moogega Cooper is one of the world’s foremost experts on sterilization of spacecraft materials, working for NASA’s Jet Propulsion Laboratory’s Planetary Protection Group. She is a planetary protection scientist charged with keeping not only Earth safe from alien life forms, but with making sure human’s extra-terrestrial voyages don’t infect places like the moon, Mars or even the moons of Jupiter. Join us as...
March 8, 2022
Organizer:
Red Hat Location:
Virtual
Innovation and IT Government IT Insight...
Registration for this event is now closed Transforming Government through Technology Based Initiatives By taking a citizen centric approach to information technology, public sector leaders can deliver services in a fast, more secure, and reliable manner. While many see the value proposition in investing in information technology there are barriers to adoption. These include security, compliance, budgetary realities, and existing roadmaps. Info...
Security Transformation Summit
It’s never been more obvious that cybersecurity is critical to the missions of every organization across the public sector. As the nation looks to recover from a once-in-a-century pandemic and increasing and more sophisticated cyberattacks, the U.S. government must ensure that it can secure its networks and data against evolving threats and provide resilient services to Americans during this new normal. Join top public sector decision-ma...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.