Accelerating Digital Transformation for...
Red Hat OpenShift Virtualization enables running both VMs and containers on a unified Kubernetes platform across cloud, datacenter and edge. Join Red Hat on May 7th to learn how to migrate VMs to OpenShift and manage them with Ansible Automation Platform for continuous compliance and health. Key Highlights include:A comprehensive agenda featuring senior keynote speakers, professional development seminars, industry engagements, business matchma...
Secure Miami
Secure Miami returns for its 9th edition on Wednesday, May 7, 2025, hosted by DigitalEra Group and Florida International University. As South Florida’s premier cybersecurity conference, this full-day event brings together over 300 IT security professionals for impactful keynotes, dynamic panel discussions, and high-value networking. This year’s theme, Empowering Trust, Transforming Security, explores how innovation and collaboratio...
Beyond the Administration’s First 100 D...
Join our panelists as they discuss how leading financial services companies can effectively navigate the evolving policy landscape and adapt to regulatory and supervisory changes during the second Trump administration. In this webcast, the panelists will discuss:Digital assets/crypto: the implications of the administration's approach to digital assetsGrowth and M&A: market developments and regulators’ initiatives affecting organic gr...
May 7, 2025
Organizer:
EY Location:
Webcast
Transforming Missions from the Edge to...
Artificial intelligence is reshaping government security efforts — serving as a force multiplier while introducing new risks that demand thoughtful management. In the first discussion of the Billington Cyber & AI Outlook Series, government and industry experts will explore how AI is transforming supply chain risk management, cybersecurity in contested environments and more. Key Topics:The role of AI in modern cybersecurity strategies...
Enterprise Education Series: Intro to SD-WAN
Join us for the Intro to SD-WAN webinar and earn one Continuous Learning Point (CLP) for attending. The Enterprise Education Series is designed to:Expand your awareness of innovative contract solutionsHelp you drive transformative outcomesProvide you with direct GSA points of contact for support and additional educationThis event will be a solutions-focused virtual learning “power hour” to bring educational content directly to you...
CyberSmart 2025: From A to Z
The cyber world is becoming increasingly complex as new technologies, policies and expectations come into play. Artificial intelligence (AI) is making inroads into applications, network management, and more, while identity management and zero trust architectures are altering the threat landscape. Agencies are embracing the many varied cloud deployments, such as multi-cloud, hybrid, private, etc. All new technologies introduce new elements of r...
May 2, 2025
Organizer:
FedInsider Location:
Webcast
CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
Accelerate Government Digital Transform...
Organizations are facing mounting pressure to modernize their operations while balancing efficient service delivery with stringent security requirements and complex compliance demands. With new executive orders and heightened citizen expectations, it’s imperative that agencies build future-ready digital operations that uphold the highest standards of security and accessibility in public service delivery. Join us on May 1st to explore how...
May 1, 2025
Organizer:
ATARC Location:
Webcast
Cracking Down on Insider Threats ...
Kristin Carpenter, OSINT Expert, will explore how insider threats pose one of the biggest security challenges to organizations today—and how connected threat intelligence and OSINT can help identify them quickly. By walking through a real-world insider threat scenario, we’ll demonstrate how a unified platform brings together domains, IPs, social data, and more to uncover hidden connections. Discover How Proofpoint, VirusTotal, Doma...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.