Harnessing AI & ML for Smarter Cybersecurity
As cyber threats grow more sophisticated, agencies must move beyond static defenses to intelligence-driven security. And while AI and machine learning (ML) enhance efficiency by detecting anomalies, forecasting risks, and accelerating response, agencies still need to address concerns about verification of alert evidence and suggested response actions. AI-powered security integrates with existing tools like Security Information and Event Manage...
May 15, 2025
Organizer:
FedInsider Location:
Webcast
Carahsoft's AI for Government Summit 2025
Join Red Hat onsite on May 15th for Carahsoft’s AI for Government Summit as the premier event for exploring how AI is revolutionizing the Public Sector. This summit brings together Federal, State and Local Government leaders, industry innovators and technology experts to discuss the transformative potential of AI in addressing the nation’s most pressing challenges. Attendees will gain actionable insight into how Generative AI is tr...
Establishing Zero Trust Data Resilience...
Ransomware attacks are more relentless than ever—46% of organizations face attempted breaches at least once a month. The question isn’t if an attack will happen, but when. Is your data protection strategy strong enough to recover? Discover how zero trust data resilience can safeguard your business against cyber threats. Alex Arcilla, Principal Analyst at Enterprise Strategy Group, now part of Omdia, will share insights from her lat...
The "No Wrong Door" Evolution: Simplify...
State and local agencies are navigating a landscape where digital identity systems, often designed for a different era, face mounting pressure. The rising demand for mobile-first experiences, the necessity of interagency collaboration, and increasingly sophisticated cyber risks test the limits of infrastructures built before these factors became paramount. As a result, many organizations deal with a patchwork of login systems, frustrated resid...
Cyber Protection for Unprotected OT Devices
In today's increasingly complex and distributed digital workforce, every organization is faced with the challenge of securing their expanding infrastructure while supporting legacy systems and edge services. Traditional network security models that rely too heavily on rule-based perimeter defenses and simple user authentication are no longer sufficient. There is where the identity and policy-based security model of CSOI (Cybersecurity Operatio...
Breach at the Brewery - a Cybersecurity...
Join your fellow IT & Cyber professionals for a high-energy evening of great conversation, hands-on learning, and a little friendly competition! Face off against your peers in the Hunter Challenge - a Capture-the-Flag style game featuring real-world scenarios around advanced threat detection and network visibility. Do you have what it takes to be crowned the ultimate threat hunter? Join us on May 15 to enjoy: Local craft brews and tasty bi...
Huntress After Hours - Philadelphia
We’re coming to you—hang with us at Huntress After Hours! Built for Value-Added Resellers & Internal IT DepartmentsSick of playing catch-up with the bad guys? Let’s level up your cybersecurity game. We'll break down the latest threats, share battle-tested strategies, and show you how Huntress can help you wreck hackers before they wreck you. What You'll Get:Huntress in action: See how our managed platform helps you proact...
May 14, 2025
Organizer:
Huntress Location:
Philadelphia, PA
Navigating the Transition: Maintaining...
As state and local governments adapt to new Trump administration policies and priorities, IT leaders must continue to modernize operations, boost efficiency, and manage risk—all while aligning with new budget priorities and accountability standards. Navigating the Transition, a webinar series from Government Technology, helps decision-makers decode policy shifts, explore emerging technologies, and gain expert insights on what’s nex...
Navigating the Transition: Maintaining...
As state and local governments adapt to new Trump administration policies and priorities, IT leaders must continue to modernize operations, boost efficiency, and manage risk—all while aligning with new budget priorities and accountability standards. Navigating the Transition, a webinar series from Government Technology, helps decision-makers decode policy shifts, explore emerging technologies, and gain expert insights on what’s nex...
Jack Henry Cybersecurity & Fraud + Digi...
Learn more about the intersection between digital banking, cybersecurity, and fraud. Jack Henry will host two-day events in six cities – with the Digital Banking Forum held the first day and the Cybersecurity & Fraud Forum on the second day. Day 1: Digital Banking ForumJoin digital banking and payments experts from Jack Henry as we discuss today’s research and technology trends as well as what the future holds for our fintech e...
May 13-14, 2025
Organizer:
Jack Henry Location:
Milwaukee, WI
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.