Sovereign Cloud, Private Control Hypers...
What’s really happening with sovereign cloud and secure infrastructure in government? In this episode,Jason Blais, VP of Product & Program Management at Mattermost, breaks down the real trends shaping 2025 cloud adoption—without the buzzwords. He covers:The difference between commercial and sovereign hyperscalersInfrastructure trends agencies are watchingHow governments are really moving to the cloudThe geopolitical and operati...
Piezometric Data Evaluation for Seepage...
Join us for Piezometric Data Evaluation for Seepage Characterization of Levees and Earth Dams. The webinar will show how to evaluate the time series of piezometric data for dams and levees. Theory tells us that piezometers should respond in relationship to river/reservoir levels (in a linear rate) – but it never does. Seepage computer models cannot reproduce the rate change of piezometers with reservoir/river changes. Engineers call it f...
Powering the Next Generation of Mission...
Join us to explore how Nutanix transforms the way mission-critical applications and data are deployed—anywhere, with unmatched flexibility and performance. Whether you're navigating complex hybrid multi-cloud strategies, rethinking legacy infrastructure, or scaling experimentation across environments like NetModX, this session is your road map to what's next.
Smart Strategies: Private 5G for DOD Us...
To secure future military advantage, the National Defense Strategy is designed to improve its digital environment and adopt the most promising technologies such as private 5G. Private 5G mobile network technology can help military installations accelerate innovation, optimize network services and modernize networks to meet mission and business needs. Join HPE Aruba Networking to learn: The key capabilities of private 5G and how it can be tailo...
Cyber Protection and Access in Conteste...
CSOI Zero Trust Networking alignment redefines how secure access and protection are controlled over various communication channels across contested and diverse IT, OT and cloud environments. By shifting focus from securing the network perimeter and away from using end-user credentials as primary network authentication to policy-based access centered around cryptographic identities, CSOI delivers a powerful identity-based, non-kinetic advantage...
Understanding the Critical Pathway to I...
Join Everfox and renowned behavioral scientist Dr. Eric Shaw for an exclusive session on the Critical Pathway to Insider Risk (CPIR) model—one of the most impactful behavioral science frameworks in insider risk management. Dr. Shaw is co-author of the seminal paper "Application of the Critical-Path Method to Evaluate Insider Risk" (Shaw & Sellers, 2015), Backed by The DOD Insider Threat Management and Analysis Center (DITMAC), the CP...
Exploiting the Everyday: Adversaries' A...
As IT systems and online services rapidly evolve, the risks facing organizations have expanded significantly. This shift is reflected in a changing threat landscape, where adversaries increasingly exploit cloud platforms and SaaS applications as part of their campaign playbooks. In this webinar, we'll explore the wide range of services, applications and tools leveraged by threat actors to bypass traditional defenses, with a focus on the ...
Celebrating 29 Years of 311's Evolution...
Attendees joined us for this special anniversary webinar as we explored the incredible journey of 311’s transformation from landlines and legacy phone banks to today’s smart, user-friendly digital front doors. Attendees heard from government innovators and CSA 311 tech experts as we reflect on the past, assess today’s tech landscape, and envision what the next era of 311 might look like.
Ghosts in the Network: APTs, AI and the...
State-sponsored threat actors like those behind Volt Typhoon aren’t relying on zero-days or smash-and-grab exploits—they’re quietly infiltrating critical networks by exploiting public vulnerabilities, using stolen credentials and leveraging built-in system tools to stay undetected for months. These campaigns are designed to evade EDR, avoid raising alarms and exploit blind spots that traditional controls were never designed t...
ISC2 SECURE Washington, DC 2025 On-Demand
If you were unable to join us in person, now you can experience the highlights anywhere, anytime. Our ISC2 SECURE Washington, DC 2025 On-Demand curated bundle gives you instant access to leading voices, expert insights and actionable strategies that will help you navigate today’s evolving cyber landscape. Catch up on what you missed and earn up to 6.75 CPE credits.
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.