How Do You Know Where to Start Your Zer...
Do you have all the parts of zero trust in place to control risk to your crown jewels? If you don't know where to start, you probably need to assess your situation. Using a zero trust readiness assessment you can see what parts of the people, process, and technology triad you already have in place and what you don't. With a readiness assessment you can figure out what to focus on first in order to tackle the remaining parts of the zero trust j...
What's NOT Included in Zero Trust Archi...
Zero Trust Architecture (ZTA) incorporates many aspects of effective cyber security…but not all of them. There are many elements of information security that are implied in ZTA but are not explicitly stated. These include role-based access control (RBAC), identity management, key management and threat intelligence. Together, constitute the zero trust environment, which must be in place for the architecture to be implemented. ZTA plus th...
The Gartner Top 10 Tips, Tactics ...
Negotiating IT contracts emerged as a leading technology leadership priority, according to recent Gartner CIO research. To maximize business value, sourcing, procurement and vendor management leaders must support growth while cutting costs, adapting to changing requirements and minimizing risks. This raises the question: How can IT leaders better prepare to optimize negotiation priorities during a time of inflationary pressures rising? Join th...
May 15, 2024
Organizer:
Gartner Location:
Webcast
AFFIRM Up Lift: Strengthening Cybersecu...
In today's digital age, cybersecurity has become a crucial component of our nation's security. The recent cyberattacks on critical infrastructure, federal agencies, and private sector entities have shown us the severe and far-reaching consequences of cyber vulnerabilities. As a result, the Biden-Harris administration has made strengthening cybersecurity a top priority. On May 12, 2021, the Executive Order on Improving the Nation's Cybersecurit...
May 15, 2024
Organizer:
AFFIRM Location:
Webcast
How Infoblox Supports Public Sector Networks
Join our Infoblox-Certified Demo Jock for a 30-minute demo to learn how Infoblox can provide a smarter and more efficient way to manage and protect your network. Our presenter will discuss: The impacts on security that arise from evolving IT architectures How to leverage your current foundational infrastructures, including DNS, DHCP, and IPAM Advantages of actionable network intelligence that provides valuable insights on threats and incidents...
Build Success by Creating and Communica...
Overview Free ICMA Coaching Webinar | Recording available to registrants In this dynamic session, we'll explore the art and science of crafting a compelling vision that not only guides your organization but inspires and mobilizes teams toward shared success. Pre-registration is required for all live webinars. Can't watch it live? Register and receive an e-mail when the archive is ready to watch.
May 15, 2024
Organizer:
ICMA Location:
Webcast
Reimagining Product Development with th...
Thank you for the overwhelming response. The enrollment capacity for this event has been reached. AI is transforming the way products are designed, developed, and delivered. To stay ahead of the competition, product leaders need to leverage the power of Generative AI, a new paradigm that enables the creation of novel and high-quality content, designs, and solutions. In this webinar, Reimagining Product Development with the Power of Generative...
May 15, 2024
Organizer:
Microsoft Location:
Webcast
Tech 101: Generative AI
Generative AI is a type of artificial intelligence technology that can produce various types of content, including text, imagery, audio and synthetic data. It can be thought of as a machine-learning model that is trained to create new data, rather than making a prediction about a specific dataset. A generative AI system is one that learns to generate more objects that look like the data it was trained on, with the potential to revolutionize va...
From Risk to Resilience: Leveraging Eve...
Discover the key to operational resilience and gain insights into risk intelligence at our upcoming webinar. Learn how to safeguard your operations, accelerate response times, and protect your workforce against critical events. Severe weather, Terrorism, Civil Unrest, War, OSINT and Physical threats have a crippling effect on the business. Our session will provide a comprehensive overview of strategies to manage risks and maintain continuity,...
Zoom Trainings - May 2024
We're excited to invite you to two distinct, yet equally enriching Zoom training opportunities designed to enhance your Zoom proficiency and administrative mastery! Take the time to ask us questions, inform us about your requirements, and discover more about how Zoom can help both you and your organization. In Zoom 101 Trainings, you will learn more about the variety of tools offered by Zoom, including: Account customization Smart collaboratio...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.