Back to Search Begin New Search Save Search Auto-Notify
Accelerating AI Adoption: Bridging Fede...
Join us for an engaging and informative session that bridges the gap between federal and defense AI applications, offering actionable strategies to accelerate AI adoption and leverage its full potential in defense operations. Our panel of experts will delve into the comparative analysis of AI adoption within the U.S. Federal Government and the Department of Defense (DOD). They'll also explore the strategic integration of AI technologies across...
Add Favorite
New Era of Defense Efficiency: Optimizi...
As defense agencies face growing pressure from budget constraints and workforce reductions, IT leaders must find smarter ways to sustain operations without compromising mission effectiveness. In this webinar, Riverbed Federal CTO Bill Roberts will explore how agencies can enhance IT performance, employee productivity and cost savings in today’s defense environment. Hear real-world examples and practical strategies to monitor and remediat...
Add Favorite
New Era of Defense Efficiency: Optimizi...
As defense agencies face growing pressure from budget constraints and workforce reductions, IT leaders must find smarter ways to sustain operations without compromising mission effectiveness. In this webinar, Riverbed Federal CTO Bill Roberts will explore how agencies can enhance IT performance, employee productivity and cost savings in today’s defense environment. Hear real-world examples and practical strategies to monitor and remediat...
Add Favorite
One Screen, All Networks: A Simpler App...
From the warfighter on the edge to the policymaker in Washington, having clear, complete and timely information is imperative. Yet, today’s secure operations are often hindered by complexity, multiple workstations, siloed systems and outdated cross-domain workflows that drain resources, slow decisions and inflate costs. This webinar explores how government agencies can modernize their approach to classified and unclassified data access,...
Add Favorite
Defense Ops Debates: Breach Lessons
3 Breaches. 1 Pattern Discord 2023. Signal 2024. Treasury 2024. Three leaks, three different attack paths, and one common blind spot: unsecured mission comms. Picture the next morning's brief: classified slides splashed across social media, an ops channel scraped, and the wrong key in the wrong hands. Now, the timeline moves fast: press, hearings, budget freezes. At 11 AM ET on June 26, a 30-year Navy SEAL and a retired USAF intel chief go fro...
Add Favorite
Sovereign Cloud, Private Control Hypers...
What’s really happening with sovereign cloud and secure infrastructure in government? In this episode,Jason Blais, VP of Product & Program Management at Mattermost, breaks down the real trends shaping 2025 cloud adoption—without the buzzwords. He covers:The difference between commercial and sovereign hyperscalersInfrastructure trends agencies are watchingHow governments are really moving to the cloudThe geopolitical and operati...
Add Favorite
Powering the Next Generation of Mission...
Join us to explore how Nutanix transforms the way mission-critical applications and data are deployed—anywhere, with unmatched flexibility and performance. Whether you're navigating complex hybrid multi-cloud strategies, rethinking legacy infrastructure, or scaling experimentation across environments like NetModX, this session is your road map to what's next.
Add Favorite
Smart Strategies: Private 5G for DOD Us...
To secure future military advantage, the National Defense Strategy is designed to improve its digital environment and adopt the most promising technologies such as private 5G. Private 5G mobile network technology can help military installations accelerate innovation, optimize network services and modernize networks to meet mission and business needs. Join HPE Aruba Networking to learn: The key capabilities of private 5G and how it can be tailo...
Add Favorite
Cyber Protection and Access in Conteste...
CSOI Zero Trust Networking alignment redefines how secure access and protection are controlled over various communication channels across contested and diverse IT, OT and cloud environments. By shifting focus from securing the network perimeter and away from using end-user credentials as primary network authentication to policy-based access centered around cryptographic identities, CSOI delivers a powerful identity-based, non-kinetic advantage...
Add Favorite
Understanding the Critical Pathway to I...
Join Everfox and renowned behavioral scientist Dr. Eric Shaw for an exclusive session on the Critical Pathway to Insider Risk (CPIR) model—one of the most impactful behavioral science frameworks in insider risk management. Dr. Shaw is co-author of the seminal paper "Application of the Critical-Path Method to Evaluate Insider Risk" (Shaw & Sellers, 2015), Backed by The DOD Insider Threat Management and Analysis Center (DITMAC), the CP...
Add Favorite
Back to Search Begin New Search