18 past events found
+ 1 upcoming event found
Back to Search Begin New Search Save Search Auto-Notify
10th Annual National Small Business Con...
The U.S. Department of State, Office of Small and Disadvantaged Business Utilization (OSDBU) request that you join us for the 10th Annual National Small Business Contracting Summit | Southeast Conference, presented jointly by The American Small Business Chamber of Commerce and the U.S. Women's Chamber of Commerce, being held in Charleston, SC. This popular event boasts a robust agenda that includes: ⦁ Increased focus on making sure smal...
June 13, 2019
Organizer: U. S. Department of State
Location: North Charleston, SC
Add Favorite
Cloud Technology Day
On February 28th, Cisco, along with AWS, Red Hat, GitLab, and Elastic are hosting a cloud computing technology seminar where we will showcase and discuss a simpler, faster and more secure journey to the Public, Hybrid or Private cloud. Come hear from the best Cloud Technology providers in the market as we seek to tell a more integrated story on how we can work together, combining our strengths and expertise to support the Navy and Marine Corps...
February 28, 2019
Organizer: Force 3
Location: North Charleston, SC
Add Favorite
F5 Federal Tech Session

CANCELED

Please note: This event has been cancelled. Please join F5 Networks and our strategic Technology Partners, Venafi and FireEye, for an informative Tech Session. This will be an interactive, action packed session filled with subject matter experts, demos and labs. F5 SSL Visibility10:00AM - 11:00AMSearch engines promote TLS-based sites, governments and corporations mandate more secure communications, and browser vendors silently push updates t...
December 13, 2018
Organizer: F5 Gov Team at Carahsoft Technology Corp.
Location: North Charleston, SC
Add Favorite
Secure Software Defined Data Center for...
The speed and pace of cyber threats by state and non-state actors are bombarding DoD network defenses and threatening to undermine the United States' technological military advantage. This ever-changing face of war has created the Cyberspace AOR, driving the need for an integrated security strategy between the physical and virtual battlefield. VMware is uniquely positioned to help the Navy accomplish its mission of cyber dominance in every the...
June 28, 2018
Organizer: VMware Gov Team at Carahsoft Technology Corp.
Location: North Charleston, SC
Add Favorite
9th Annual National Small Business Cont...
Join us for the 9th Annual National Small Business Contracting Summit | Southeast Conference, presented jointly by The American Small Business Chamber of Commerce and the U.S. Women’s Chamber of Commerce, being held in Charleston, SC. This popular event boasts a robust agenda that includes: Increased focus on making sure small business federal contractors secure our fair share of federal contracting (taxpayer) dollarsAccess to federal a...
June 14, 2018
Organizer: USWCC
Location: North Charleston, SC
Add Favorite
F5 | Ansible Workshop
The name Ansible comes from a science fiction story. It was a technology that allowed the user to command and control all the starships in the galaxy. Do you want to command and control all the BIG-IPs in your galaxy? Organizations use Ansible automation tools to solve everyday automation challenges and achieve operational efficiency. Red Hat Ansible Tower helps customers scale IT automation, manage complex deployments, and increase productiv...
June 13, 2018
Organizer: F5 Networks Gov Team at Carahsoft Technology Corp.
Location: North Charleston, SC
Add Favorite
F5 SPAWAR Charleston TechTalk
Hosting workloads in an off-premise Cloud Service Offering (CSO) is becoming more prevalent in DoD. Taking advantage of cloud computing efficiencies is necessary when trying to keep up with an agile application deployment approach to IT. When utilizing these cloud compute resources, applying access control, monitoring, security and visibility as we do to our on-premise workloads is paramount in protecting the Mission Owner's applications and...
June 12, 2018
Organizer: F5 Networks Gov Team at Carahsoft Technology Corp.
Location: North Charleston, SC
Add Favorite
F5 Gov TechTalk - Charleston
Traditional firewalls (Layer 3-4) are purpose built to prevent external access to internal network resources, but these traditional firewalls offer little to no application layer protection. Threat vectors exist today at all layers of the network. Slowloris and HTTP flood attacks are examples of layer 7 attacks which would be undetected by most network firewalls. The impact of these undetected layer 7 attacks is the disruption of your mission...
November 14, 2017
Organizer: F5 Government Team at Carahsoft Technology Corp
Location: North Charleston, SC
Add Favorite
Back to Search Begin New Search