Back to Search Begin New Search Save Search Auto-Notify
The 1st NIST PQC Standards
Eight years ago, the National Institute of Standards and Technology (NIST) initiated a public process to select quantum-resistant public-key cryptographic algorithms for standardization. NIST issued the public call for submissions to the PQC Standardization Process in December 2016 and, after three rounds of evaluation and analysis, selected four algorithms for standardization: CRYSTALS-KYBER, CRYSTALS-Dilithium, FALCON, and SPHINCS+. In this...
May 7, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
On the Brink: Microsoft Security Immers...
Your data is crucial to your organization’s success and keeping that data secure is a top priority. Ensuring the protection of your company from insider risks or data loss requires quick discovery and reaction to security concerns. Your team must be ready to recognize and respond to any threat. Join this immersive simulation event, where you will engage in a level-400, real-world technical security breach. You’ll follow the actions...
May 7, 2024
Organizer: Microsoft
Location: Webcast
Add Favorite
Day 1 - Power Automate Process Mining i...
This two-day course is designed to provide participants with a comprehensive understanding of process mining, focusing on Microsoft's Power Automate Process Mining tool. Participants will learn the fundamentals of process mining, its applications, and cover how to use Power Automate Process Mining to analyze and improve business processes. The course includes hands-on labs and real-world examples to ensure participants gain practical skills. O...
May 7, 2024
Organizer: Microsoft
Location: Webcast
Add Favorite
Microsoft Power Platform Virtual Traini...
Build the skills you need to create new opportunities and accelerate your understanding of Microsoft Cloud technologies at a free Microsoft Power Platform Virtual Training Day from Microsoft Learn. Join us at Empower Everyone to Build Apps to see how to build and test model-driven and canvas apps with Power Apps. You’ll explore how to store and manage data for your apps with Microsoft Dataverse and learn how to customize applications for...
May 7, 2024
Organizer: Microsoft
Location: Webcast
Add Favorite
Defending the Human Layer in the Public...
Human error has long been the preferred weak spot for cybercriminals to attack. As the threat landscape evolves, attacks increase in sophistication, and the attack surface expands, organizations should shift their focus to empowering and securing workforce identities. This will help in addressing immediate risks and foster a proactive culture of security awareness and resilience. These weak spots may come from an unaware employee falling victi...
May 7, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
Get to Know K12 SIX: Your Partner in K-...
Join the K12 Security Information eXchange (K12 SIX) for an overview of our work, membership benefits, and forthcoming products and events. Since 2016, there have been more than 1,600 publicly disclosed cyber incidents involving U.S. public schools, including ransomware, phishing attacks, and student data breaches. As cyber-attacks against school systems become both more frequent and disruptive, the best way to respond is to collaborate in rea...
May 7, 2024
Organizer: K12 Six
Location: Webcast
Add Favorite
Coffee Break Series: SLED Research Brew...
Episode 4: "Harnessing Research for Strategic Account Planning & Account-Based Marketing" Our "Coffee Break Series: SLED Research Brew," is designed for professionals navigating state, local and education (SLED) sales and marketing. Each episode serves up a fresh cup of insights and strategies, all before you are finished with your morning coffee. Our experts will dive into the latest products, tools and methodologies that are shaping the...
May 7, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
From Documents to Digital: Transforming...
How is your agency approaching digital-centric engineering? Join moderator Jared Serbu, and government and industry leaders as they discuss the benefits of digital-centric engineering vs. document-engineering approaches, best strategies and lessons learned. Learning objectives: Current overview of digital-centric vs. document-centric engineering approaches Tactics to embrace digital engineering practices How agencies can partner with industry...
May 7, 2024
Organizer: Federal News Network
Location: Webcast
Add Favorite
Deploying Gemini for Google Workspace:...
You have access to Gemini for Google Workspace – now what? Join our digital event on May 7th to: Get hands-on experience with Gemini for Google Workspace Explore practical use cases Learn how to effectively integrate Gemini for Google Workspace into your environment Receive expert guidance on managing organizational change for a smooth and successful deployment You'll also have time for Q&A, so bring your questions!
May 7, 2024
Organizer: Google Cloud
Location: Webcast
Add Favorite
Microsoft Security Virtual Training Day...
Build the skills you need to create new opportunities and accelerate your understanding of Microsoft Cloud technologies at a free Microsoft Security Virtual Training Day from Microsoft Learn. Join us at Security, Compliance, and Identity (SCI) Fundamentals to master the basics of SCI. You’ll learn about identity and access management while exploring compliance management fundamentals and solutions. Learn the technical skills, knowledge,...
May 7-8, 2024
Organizer: Microsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search