CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
Sonar Summit Americas 2026
Good code doesn’t happen by accident; it is built with intention. On March 3, 2026, join Sonar Summit Americas, a one-day virtual event hosted by Sonar, bringing together software development leaders and practitioners from around the world. At this summit, attendees will:Hear from experts shaping modern software developmentExplore best practices for building high-quality, secure code in an AI-driven worldConnect with a global community d...
Running Government as a Business: Cost...
How does your agency use cost information today? Is cost data mainly used for allocation and reporting, or does it actively support decisions across mission delivery and IT services? Join us for a live webinar to learn how state and Federal agencies are running government as a business by applying cost transparency to both mission operations and IT. Through real-world Federal use cases, this session shows how agencies move beyond traditional c...
Zscaler Public Sector Summit 2026
The cyber battle is here—and government agencies, educational institutions and industry partners are on the frontlines against nation-state adversaries wielding increasingly sophisticated tactics and weaponized AI. The 2026 Zscaler Public Sector Summit is your opportunity to lead the charge. Discover how Zero Trust Everywhere and AI-driven security approaches hold the keys to protecting critical systems, safeguarding sensitive data, and...
March 3, 2026
Organizer:
Zscaler Location:
Washington, DC
Blind Spots To Enforced Control: Armis...
State and local Government agencies are facing a rapidly expanding attack surface, fueled by the growing number of unmanaged and hard-to-inventory assets across IT, OT, IoT cloud and remote environments. These visibility gaps create critical blind spots, increasing cyber risk, complicating compliance and slowing incident detection and response across increasingly complex infrastructures. Join us for our complimentary webinar featuring subject...
Red Hat Ansible: Security and Complianc...
Security and compliance requirements continue to grow as IT environments become more distributed, dynamic and complex. As organizations adopt hybrid and multicloud strategies, security teams are challenged to maintain consistent configurations, reduce risk and meet regulatory requirements across a wide range of systems. Manual processes are often time consuming, difficult to scale and prone to human error, making it harder to detect drift, res...
Introducing Lakeflow: The Future of Dat...
Building modern data pipelines shouldn’t require juggling a patchwork of disconnected tools or managing complex handoffs. As data demands grow across government, agencies need a unified, reliable approach to ingesting, transforming and orchestrating data, without compromising governance or control. Join Databricks for a webinar introducing Lakeflow, a unified data engineering solution for building scalable, high-performance data pipeline...
Google Public Sector Colorado AI Day Roadshow
What You Will Experience This event is a strategic deep dive, giving you the knowledge and connections to drive tangible next steps for your agency. You will benefit from: Strategic Vision: A keynote from Google highlighting our advancements and investment in the Public Sector, followed by a Customer Keynote on the value of AI adoption. Real-World Use Cases: Hear from our partners on cross-functional AI applications tailored for state governme...
From Vendor Exposure to Active Threat
You've locked down your agency's perimeter, deployed Zero Trust controls and trained your workforce to avoid phishing emails. But what about the hundreds – or thousands – of suppliers, contractors and mission partners who access your systems, handle your data and keep critical operations running every day? Here's the reality: Adversaries don't just attack federal agencies head-on anymore. They target your weakest link – your...
Hands-On Forescout Test Drive
During this event, participants will get a hands-on experience designed to show how their customers can gain complete visibility and control across their entire network.
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.