Back to Search Begin New Search Save Search Auto-Notify
How to Secure Your Agency's Identities...
A zero trust approach to securing your infrastructure is fundamental to reducing risk — and securing identities lies at the core of a successful zero trust strategy. Together, BeyondTrust and Ping Identity deliver the key components of zero trust including privileged identity security, using multi-factor authentication and SSO, with complete visibility and analytics. Join us on June 18 at 1:00pm ET for a tech talk and live demo to see ho...
June 18, 2024
Organizer: BeyondTrust Government Team at Carahsoft
Location: Webcast
Add Favorite
Women in AFCEA Virtual Happy Hour: June 2024
Join Women in AFCEA for our popular virtual happy hour! Switch off from work, grab a drink, and join your fellow women professionals for a positive chat about life in the IT/Cyber/Global Security industry. This month we'll be chatting with WIA marketing lead, Ariel Glassman, about how to optimize your LinkedIn profile and how to make it work for YOU!
June 18, 2024
Organizer: AFCEA International
Location: Webcast
Add Favorite
Virtual Lunch N Learn with Workvivo
In this webinar you will learn how Workvivo by Zoom can personalize and automate communication and increase engagement throughout your organization. According to a research study by Gallup, agencies with a high engagement rate also have increased profits, decreased absences, and experienced a fast turnover from any form of economic challenges. Topics that will be covered include: The latest innovations created by Zoom on the communications fro...
June 18, 2024
Organizer: Zoom Government Team at Carahsoft
Location: Webcast
Add Favorite
Unmasking Cyber Shadows: Enhancing Cybe...
Meet a powerful ally in the world of Cybersecurity: Constella Intelligence's Deep OSINT investigations fueled by AI, it taps into the world's largest breach data lake collected from the surface, deep and dark web. Join us to learn how agencies can leverage deep OSINT to:Disrupt crime at its source by uncovering synthetic Identities Conduct cybercriminal identify graphing to unveil threat actors at the individual level Achieve greater scalabili...
June 18, 2024
Organizer: Constella Government Team at Carahsoft
Location: Webcast
Add Favorite
Engineering Cybersecurity Mitigations f...
Large water utilities are looking to gain efficiencies by adopting new distributed edge devices and digital transformation initiatives incorporating the latest machine learning and AI algorithms. Meanwhile, small to mid-size municipalities, are wanting to maintain their reliability without increasing their rate-base. Yet, a worsening threat environment looms over North American and European operators. Increasingly sophisticated criminal ransom...
June 18, 2024
Organizer: Waterfall Security
Location: Webcast
Add Favorite
Event-Driven Ansible Workshop + Getting...
As a part of Red Hat® Ansible® Automation Platform, Event-Driven Ansible can process events containing discrete intelligence about conditions in the IT environment, determine the appropriate response to the event, then execute automated actions to address or remediate the event. This workshop will demonstrate Event-Driven Ansible and how it provides the event-handling capability needed to automate time-consuming tasks and respond to changing c...
June 18, 2024
Organizer: Red Hat
Location: Boston, MA
Add Favorite
Event-Driven Ansible Technical Workshop
As a part of Red Hat® Ansible® Automation Platform, Event-Driven Ansible can process events containing discrete intelligence about conditions in the IT environment, determine the appropriate response to the event, then execute automated actions to address or remediate the event. This workshop will demonstrate Event-Driven Ansible and how it provides the event-handling capability needed to automate time-consuming tasks and respond to changing c...
June 18, 2024
Organizer: Red Hat
Location: Reston, VA
Add Favorite
Red Hat OpenShift Virtualization Workshop
Join us for a hands-on workshop and overview of Red Hat® OpenShift® Virtualization. Learn about all things OpenShift Virtualization from our experts and explore the possibilities that await on your infrastructure modernization journey. A half-day experience, this workshop caters to VMadmins and infrastructure architects, with a tailored, hands-on lab that takes a comprehensive look at OpenShift Virtualization fundamentals, importing, networkin...
June 18, 2024
Organizer: Red Hat
Location: Maryland Heights, MO
Add Favorite
Managing Red Hat Device Edge with Ansib...
Please join Red Hat for a brief update on Red Hat® Enterprise Linux® 9 new features and a hands-on experience around management of edge devices that are deployed in protected networks where network connectivity may not always be possible. During this session, you will connect an edge device to a management platform, deploy an application, and expose the frontend of that application for public consumption. This event is targeted for a technical...
June 18, 2024
Organizer: Red Hat
Location: San Antonio, TX
Add Favorite
Seepage Through Earth Dams
This introductory course is designed to be a participatory, interactive workshop, which will cover the basic elements required to understand and evaluate seepage-related issues for earth dams. The course begins with providing an understanding of why seepage mechanisms in earth dams are important to dam safety. Information on seepage mechanics, including permeability and erodibility will then be presented. The presentations will then progress t...
June 18-21, 2024
Organizer: Association of State Dam Safety Officials
Location: Virtual
Add Favorite
Back to Search Begin New Search