AI-Powered Data Pipelines: Smarter, Saf...
State and local governments want to move fast with AI — but not at the expense of data security, compliance or control. In this live demo webinar, you'll see how a secure, infrastructure-level approach to AI can simplify operations, reduce manual lift and give IT leaders the peace of mind to scale confidently. This session will walk through how AI data pipelines can be automated, governed and streamlined from the storage layer — no...
Eliminate Attack Pivoting with Network...
Consequence boundaries connect networks with dramatically different worst-case consequences of compromise – for example, IT networks connected to base microgrids, building automation or other OT networks. At consequence boundaries, we must eliminate the possibility of online attacks pivoting into our high-consequence networks – an emerging space of network engineering. Join Waterfall Security and Carahsoft to explore how network en...
From Vision to Reality: A Public Sector...
Join Docusign on January 13th for an exclusive webinar that will highlight how San Miguel County transformed its operations through Docusign's Intelligent Agreement Management (IAM) platform. Attendees will hear firsthand how the county moved away from manual, paper-heavy workflows and the measurable improvements they achieved in efficiency, compliance, and cross-department collaboration.
The Gartner 2026 Predicts for Oil and G...
AI is moving fast in oil and gas. By 2026, most companies could have AI agents embedded in daily workflows. The risk? Disruption, wasted investment, and cultural resistance. The opportunity? A step-change in operational efficiency and decision-making — if you get the transition right. This session explores how CIOs and business leaders can navigate the shift to human-machine collaboration without derailing operations or eroding trust. Yo...
January 13, 2026
Organizer:
Gartner Location:
Webcast
IPB: Mandatory New MAS Contractor Orientation
Join our mandatory PSHC New Contractor Orientation, specifically designed for newly awarded MAS contract holders. Enhance your GSA Schedule Contract management skills and explore:Effective management of your PSHC MAS ContractUnderstanding GSA sales and the post-sale processMarketing strategies and benefits of your MAS ContractInsights into forecasting opportunitiesDive in and take your GSA Schedule Contract to the next level!
Zero Trust: Reinforcing Cyber Resilienc...
In today’s cybersecurity landscape, maintaining trust boundaries is critical. This session dives into Zero Trust principles and architecture tailored for Federal health environments. Learn practical steps for adoption, discover solutions to common deployment hurdles, and explore how Zero Trust secures sensitive patient data while maintaining operational efficiency in military healthcare operations. What you will learn:The core principles...
AUSA Noon Report: Medical Support to th...
AUSA’s Noon Report webinar series features presentations by senior Army leaders responsible for key programs and initiatives, as well as contemporary military authors who weave together the past, present and future story of the United States Army. Please join us on Wednesday, 14 January, at 12:00 EDT for a Noon Report with Lieutenant General Mary Krueger Izaguirre, the 46th Surgeon General of the Army (TSG) and Commanding General, U.S. A...
Narrative Attacks Dont Go Viral on Thei...
In today’s information environment, threat actors, influencers and nation-states are targeting executives and organizations to shape public perception. These narrative attacks are intrinsically connected and aimed to cause financial, operational and reputational harm. The challenge is that these intelligence workflows often treat them as separate problems that threat intelligence and social listening can’t follow. This session draw...
Securing Remote Access in OT: A Critica...
Operational Technology (OT) environments are more dependent than ever on remote access—for vendor support, troubleshooting, and data sharing—yet each connection can expand the attack surface. From disruptive ransomware to the cascading impacts seen in events like Ukraine’s 2015 grid attacks and Colonial Pipeline, the lesson is clear: Remote access is both a necessity and a potential vulnerability. This webcast distills guidan...
An Hour at the Analyst Desk NDR Tableto...
Join Trellix and Carahsoft at our Analyst Desk — An NDR Tabletop Exercise! We are hosting a special session, "An Hour at the Analyst Desk", designed to give you a hands-on look at modern network threat hunting. During this interactive exercise, we will walk through a realistic kill-chain scenario. You will see exactly how an analyst uses Trellix NDR to pivot from a vague alert to a confirmed detection. It’s a great opportunity to s...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.