Back to Search Begin New Search Save Search Auto-Notify
Harnessing AI & ML for Smarter Cybersecurity
As cyber threats grow more sophisticated, agencies must move beyond static defenses to intelligence-driven security. And while AI and machine learning (ML) enhance efficiency by detecting anomalies, forecasting risks, and accelerating response, agencies still need to address concerns about verification of alert evidence and suggested response actions. AI-powered security integrates with existing tools like Security Information and Event Manage...
May 15, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Carahsoft's AI for Government Summit 2025
Join Red Hat onsite on May 15th for Carahsoft’s AI for Government Summit as the premier event for exploring how AI is revolutionizing the Public Sector. This summit brings together Federal, State and Local Government leaders, industry innovators and technology experts to discuss the transformative potential of AI in addressing the nation’s most pressing challenges. Attendees will gain actionable insight into how Generative AI is tr...
May 15, 2025
Organizer: Red Hat Government Team at Carahsoft
Location: Reston, VA
Add Favorite
Establishing Zero Trust Data Resilience...
Ransomware attacks are more relentless than ever—46% of organizations face attempted breaches at least once a month. The question isn’t if an attack will happen, but when. Is your data protection strategy strong enough to recover? Discover how zero trust data resilience can safeguard your business against cyber threats. Alex Arcilla, Principal Analyst at Enterprise Strategy Group, now part of Omdia, will share insights from her lat...
May 15, 2025
Organizer: Pure Storage
Location: Webcast
Add Favorite
The "No Wrong Door" Evolution: Simplify...
State and local agencies are navigating a landscape where digital identity systems, often designed for a different era, face mounting pressure. The rising demand for mobile-first experiences, the necessity of interagency collaboration, and increasingly sophisticated cyber risks test the limits of infrastructures built before these factors became paramount. As a result, many organizations deal with a patchwork of login systems, frustrated resid...
May 15, 2025
Organizer: Government Technology
Location: Webcast
Add Favorite
Cyber Protection for Unprotected OT Devices
In today's increasingly complex and distributed digital workforce, every organization is faced with the challenge of securing their expanding infrastructure while supporting legacy systems and edge services. Traditional network security models that rely too heavily on rule-based perimeter defenses and simple user authentication are no longer sufficient. There is where the identity and policy-based security model of CSOI (Cybersecurity Operatio...
May 15, 2025
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Breach at the Brewery - a Cybersecurity...
Join your fellow IT & Cyber professionals for a high-energy evening of great conversation, hands-on learning, and a little friendly competition! Face off against your peers in the Hunter Challenge - a Capture-the-Flag style game featuring real-world scenarios around advanced threat detection and network visibility. Do you have what it takes to be crowned the ultimate threat hunter? Join us on May 15 to enjoy: Local craft brews and tasty bi...
May 15, 2025
Organizer: ExtraHop Networks
Location: Alexandria, VA
Add Favorite
Huntress After Hours - Philadelphia
We’re coming to you—hang with us at Huntress After Hours! Built for Value-Added Resellers & Internal IT DepartmentsSick of playing catch-up with the bad guys? Let’s level up your cybersecurity game. We'll break down the latest threats, share battle-tested strategies, and show you how Huntress can help you wreck hackers before they wreck you. What You'll Get:Huntress in action: See how our managed platform helps you proact...
May 14, 2025
Organizer: Huntress
Location: Philadelphia, PA
Add Favorite
Navigating the Transition: Maintaining...
As state and local governments adapt to new Trump administration policies and priorities, IT leaders must continue to modernize operations, boost efficiency, and manage risk—all while aligning with new budget priorities and accountability standards. Navigating the Transition, a webinar series from Government Technology, helps decision-makers decode policy shifts, explore emerging technologies, and gain expert insights on what’s nex...
May 14, 2025
Organizer: Government Technology
Location: Webcast
Add Favorite
Navigating the Transition: Maintaining...
As state and local governments adapt to new Trump administration policies and priorities, IT leaders must continue to modernize operations, boost efficiency, and manage risk—all while aligning with new budget priorities and accountability standards. Navigating the Transition, a webinar series from Government Technology, helps decision-makers decode policy shifts, explore emerging technologies, and gain expert insights on what’s nex...
May 14, 2025
Organizer: Government Technology
Location: Webcast
Add Favorite
Jack Henry Cybersecurity & Fraud + Digi...
Learn more about the intersection between digital banking, cybersecurity, and fraud. Jack Henry will host two-day events in six cities – with the Digital Banking Forum held the first day and the Cybersecurity & Fraud Forum on the second day. Day 1: Digital Banking ForumJoin digital banking and payments experts from Jack Henry as we discuss today’s research and technology trends as well as what the future holds for our fintech e...
May 13-14, 2025
Organizer: Jack Henry
Location: Milwaukee, WI
Add Favorite
Back to Search Begin New Search