Generative to Agentic AI: Shaping the N...
Federal agencies are moving from AI experimentation to real-world implementation, raising new questions around strategy, governance and measurable mission impact. During this webinar, government and industry leaders will discuss how agencies are implementing artificial intelligence today, sharing lessons learned from current pilot and production use cases and how those efforts are shaping longer-term AI strategies. Panelists will also examine...
DevSecOps: Building Secure-by-Design Systems
As agencies modernize infrastructure, adopt cloud-native architectures, and implement Zero Trust strategies, DevSecOps has become essential to secure, agile government operations. This free virtual workshop brings together public sector IT leaders, cybersecurity professionals, and industry innovators to explore how integrated development, security, and operations can accelerate mission success. As we move into 2026, the integration of developm...
AI Aftershocks in Healthcare
For leaders in healthcare and education, transforming patient care and operational efficiency demands more than basic AI adoption. Organizations demand secure, scalable and compliant data strategies that span siloed EHRs, research data and hybrid environments. By empowering providers to convert data into actionable intelligence while maintaining operational control and cost efficiency, organizations can tackle complex AI and data challenges wi...
Fortra February Tips and Tricks Webinars
Government & Federal agencies face unique challenges when it comes to managing sensitive information. This introductory webinar series is designed for program managers, compliance officers, and IT leaders in the federal space who need to establish or strengthen their data classification programs to meet strict regulatory requirements. For many federal organizations, data classification begins and ends with a manual label. However, in an er...
Creative Editing Powered by Intelligent...
Whether you’re new to photo editing or looking to dramatically streamline your workflow, this webinar will get you up to speed and showcase the future of cloud-based photo editing and management. Join us for a complimentary webinar as we explore and demonstrate the powerful capabilities of Adobe Lightroom, including web-based editing, seamless syncing across devices and professional tools to elevate your images from capture to final expo...
AI As a Force Multiplier in Investigations
Investigations today are under real pressure. Teams are dealing with growing volumes of digital evidence, limited resources and rising expectations for speed and accuracy. With evidence coming from more sources and in various formats, agencies need faster ways to uncover insight without sacrificing accuracy or transparency. Join us for a complimentary webinar to learn how agencies are using Veritone iDEMS to work more efficiently and manage ev...
The Human Firewall: Turning Employees i...
Join Arctic Wolf and Carahsoft for this informative webinar to learn how Arctic Wolf Managed Security Awareness helps organizations turn employees into an active security layer — your human firewall — through engaging, threat-driven microlearning. This session will explore how Arctic Wolf delivers short, three-minute awareness lessons, continuously updated to reflect real-world attacker tactics and delivered seamlessly to employees...
Detroit Cybersecurity Conference
Join Us in Detroit for the Futurecon Cybersecurity Event!Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.Don’t miss our special ceremony recognizing our...
February 19, 2026
Organizer:
FutureCon Location:
Novi, MI
Preparing for OMB PQC Reporting: A Prac...
Federal agencies are now required under OMB Memorandum M-23-02 and National Security Memorandum-10 to inventory cryptographic assets, identify quantum-vulnerable algorithms and report progress toward post-quantum cryptography (PQC) readiness. Yet many agencies are unsure what these mandates actually require in practice, how discovery and inventory tools fit into compliance or how to determine whether their current environments provide sufficie...
10 Properties of Secure Open Source Software
This online training will explore why software supply chain security has become a top concern as open-source software now powers the vast majority of modern applications. Drawing on real-world incidents like Log4Shell, malicious code injected into the Linux Kernel and phishing campaigns targeting PyPI, the session will examine how these threats emerge and why agencies are seeing increased government guidance and oversight. Attendees will learn...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.