Exports Hidden Pipeline: Mapping Chinas...
Export’s Hidden Pipeline: Mapping Illicit Supply Chains into the U.S. Illicit supply chains are evolving fast — using front companies, falsified records, and complex routing to smuggle restricted goods into the U.S. These operations are built to evade detection, leaving enforcement teams struggling to keep pace. Join our webinar, experts from Datenna will explore how cutting-edge open-source intelligence (OSINT) is helping agencies...
Red Hat Summit Connect: Washington, DC
Red Hat® Summit is going on tour with Red Hat Summit: Connect. Join us this fall as we bring interactive labs, demos, and networking opportunities to a city near you, so you can keep exploring what’s next in hybrid cloud, artificial intelligence, open source, and IT. Our Red Hat® Summit: Connect events will give you in-person access to Red Hat experts and industry collaborators, labs, demos, and more — at no cost. With more...
October 1, 2025
Organizer:
Red Hat Location:
Washington, DC
Building Secure Containers for Public S...
Looking to boost your career in software development, cybersecurity or IT? Our hands-on Chainguard and AlphaBravo.io workshop, is your chance to gain or increase your skills in securing open-source container images. Whether you're a developer or just curious, you will learn to reduce software supply chain risk and meet container hardening requirements. Join Chainguard and AlphaBravo.io on October 1st to learn how to:Build secure-by-default con...
Hot Topics in Cybersecurity Day 2: Main...
After seeing first-hand the massive effects of supply chain disruption during the pandemic and the impact of accidentally using infected open-source software by software providers, state and local governments are aware of the risks of supply chain disruptions due to a cyber attack. Agencies have to broaden their thinking about where risks may be encountered. For instance, cybersecurity experts see the Salt Typhoon incursion into several U.S. t...
September 17, 2025
Organizer:
FedInsider Location:
Webcast
SANSFIRE 2025
Elevate your cybersecurity expertise with this SANS premier training event, SANSFIRE 2025 (July 14-19). Led by industry-leading instructors renowned for their deep knowledge and practical insights, this annual event not only boasts unparalleled, live Q&A access, but the opportunity to network with your favorite cyber experts! Filled with hands-on labs, simulations, and exercises designed to equip you with practical skills you can apply the...
Neo4j Good to Great: Graph Database Wor...
You’re Invited - Neo4j Good to Great: Graph Database Workshop Series for Federal Professionals About the Event Join us for an immersive full-day Neo4j training session, tailored for Software Developers, Application Architects, Data Scientists, and Data Analysts in the federal community. This comprehensive course is designed to elevate your understanding of graph database technology and its applications in enterprise settings. Why Attend?...
June 5, 2025
Organizer:
Neo4j Location:
Reston, VA
Strengthen Your ATO Approach & Drive Se...
Join Black Duck & Carahsoft for an engaging webinar that will delve into how our advanced solutions facilitate continuous Authority to Operate (ATO) while aligning with stringent government compliance standards. As agencies embrace agile development practices and open source components, maintaining security and regulatory adherence is paramount. Attendees will gain valuable insights into streamlining their ATO processes, ensuring that thei...
Achieve Scalable AI Success in Your Ent...
No matter where you stand in your AI journey, embracing advanced AI solutions can accelerate problem-solving, enhance decision-making and deliver impactful results for your organization. Join Red Hat virtually for an overview of Red Hat Enterprise Linux AI (RHEL AI).Explore how to develop and fine-tune large language models (LLMs) with InstructLab to meet your specific business needs Discover how to train and deploy AI models seamlessly across...
Unmasking Digital Deception: Deepfake D...
In our upcoming webinar, we’ll unveil the latest strategies and technologies for identifying and countering deepfake threats, helping you elevate your open-source intelligence efforts and safeguard critical information flows. During this webinar, attendees will learn:Deepfake Identification Methods: Explore proven techniques and AI-driven tools for detecting highly realistic synthetic content.Real-World OSINT Scenarios: Discover how deep...
A Tale of Scale & Speed: How the US Nav...
Rapid and secure feature delivery is a goal across every application team and branch of the Department of Defense. With Anchore's best-in-class container security, your agency can achieve faster security remediation while managing open-source risk across dynamic environments. Join us on January 29th for an Executive Briefing at WEST where we will dive into a case study on the the Navy’s DevSecOps platform, Black Pearl Party Barge, and wh...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.