FedTalks 2024
The federal government is in the midst of a digital transformation that has the potential to reinvent the way agencies provide citizen services and perform their most essential functions. Guided by the top priorities of the White House, leaders across the federal government are embracing modern technologies like AI and the cloud, fortifying cybersecurity by shifting to zero-trust architectures and prioritizing user experience in digital servic...
Introduction to F5 BIG-IP Next
Join F5 for this virtual lab and get your hands on the Next generation of BIG-IP software! In this hands-on lab, you will learn: How to manage BIG-IP Next data plane nodes using the Central Manager GUI How to deploy and operate applications What a classic BIG-IP migration to Next entails How to protect applications using security policy HA and Next data plane upgrades How to debug BIG-IP Next Don't miss out - Register Now!
Empowering Virtual Training in Governme...
In today's digital landscape, government agencies are increasingly turning to virtual platforms for training, education, and seminars. This transition requires sophisticated tools and strategies to ensure seamless and effective experiences. As technology reshapes how government agencies like the Department of Commerce (DOC) and its sub-agencies approach these initiatives, it's crucial to stay updated with best practices and emerging trends. Jo...
Tidelift is Hosting Upstream: A One Day...
Upstream 2024, hosted by Tidelift, is set to tackle the persistent challenges of improving the health and security of open source software through a virtual symposium focused on pioneering technologies and unconventional solutions. Tune in on June 5 to take part in innovative discourse, connecting thought leaders, open source maintainers and visionaries from diverse fields. By attending this virtual event, you can expect to: Learn emerging and...
Salt Lake City Cyber Security Summit
The Second Annual Salt Lake City Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission gives you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
SecureWorld Chicago
SecureWorld events and programming foster Growth, Access, and Excellence among cybersecurity professionals. SecureWorld is… the stepping stone to grow in your abilities and career path SecureWorld is… access to the knowledge and solutions you need, in the place you live SecureWorld is… a unique experience with excellence in both speakers and content For more than 22 years, SecureWorld has been tackling global cybersecurity...
June 6, 2024
Organizer:
SecureWorld Location:
Rosemont, IL
Government Customer Experience & Engage...
As constituents' expectations evolve alongside technological advancements, government agencies must adapt their services to better meet the needs of customers across the nation. Doing so requires focus on and investment in the customer experience (CX). And with the emergence of artificial intelligence (AI) leaders are looking to its potential to improve CX. How is the rise of cutting-edge technologies like AI reshaping traditional approaches t...
June 6, 2024
Organizer:
Carahsoft Location:
Washington, DC
Babel Street GEOINT Webinar
Join our upcoming webinar to learn how to ensure your geolocation data is up-to-snuff and empowers, not hinders, your analysis! Geolocation analysis offers a powerful tool for understanding spatial trends and patterns. However, the accuracy and reliability of derived insights fundamentally depend on the data quality. Rarely does the required data come off the shelf and ready for analysis without additional cleansing, enriching, and standardizi...
Implementing Zero Trust Controls and Mo...
Cybersecurity compliance frameworks are curated with the most effective methodologies an organization can take to prevent cyberattacks and reduce the impact if one occurs. If passed in current form, NIST 800-171A Rev.3 final public draft will adopt substantial changes to existing compliance controls required by the Cybersecurity Maturity Model Certification (CMMC). All those within the Defense Industrial Base will be required to observe subst...
Unlocking the Potential of Proofpoint S...
The public sector is under constant threat from cyber criminals who employ advanced tactics such as phishing, ransomware, imposter emails, and other methods to exploit employee vulnerabilities. Human error is typically the starting point of most attacks, and cyber criminals have become adept at using social engineering techniques to target individuals with personalized messages designed to be highly persuasive. With people acting as the most c...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.