SolarWinds Technology Workshop - Columbus
Join SolarWinds for a one-day, interactive workshop at the Columbus Country Club to learn more about the technology challenges facing state and local agencies and the best practices for IT service delivery & infrastructure, observability, compliance and reporting. This interaction session will also deep dive into SolarWinds Hybrid Cloud Observability–our most comprehensive monitoring platform for your observability needs. Presentatio...
How to Hunt for Volt Typhoon Malware in...
The federal government has strenuously and repeatedly stated that critical infrastructure providers must be proactive in hunting for malware that may be present in networks, focusing specifically on CCP-sponsored Volt Typhoon Adversary. Join critical infrastructure experts for a panel discussion on how to hunt for Volt Typhoon. Discussion topics will include: How Four18 Intelligence uses UnknownCyber ThreatHunter to hunt for Volt Typhoon and...
INTERFACE Phoenix 2024
Welcome to INTERFACE Phoenix 2024! IT Infrastructure is constantly changing, bringing new challenges every day. From ransomware and the latest security threats to the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations, to help educate, advise...
Explore Your Entire IT Landscape With I...
Join us to see how you can take charge of your IT infrastructure and digital services with ServiceNow ITOM Visibility. This session dives into how ITOM Visibility not only automatically discovers all of your IT resources, but also maps them to create a single, unified view of your entire IT landscape along with an up-to-date, and consistent record in your ServiceNow CMDB. This powerful combination helps you reduce costs and complexity, while a...
June 24, 2024
Organizer:
ServiceNow Location:
Webcast
Securing Supply Chains: How Data and Te...
In an increasingly connected world, disruptions to supply chains can severely impact the Department of Defense’s ability to sustain readiness and execute missions. Consequently, it's critical to analyze, predict, and mitigate potential supply chain risks through innovation in technology and data. By layering publicly available information sources, analysts and government officials can more effectively uncover hidden risk in defense indus...
June 25, 2024
Organizer:
GovExec Location:
Webcast
On the Watch: Securing America's Supply...
From the energy grid to defense factories, America’s critical sites and services are a national priority. Keeping them up and running means staying ahead of the threat and protecting the supply chains that feed into them. What tools and advanced technologies are needed to defend and protect U.S. critical infrastructure? How is artificial intelligence factoring in, and where do leaders see new opportunities? How are defense and intelligen...
June 26, 2024
Organizer:
POLITICO Location:
Washington, DC
Securing the Municipal Water Supply fro...
Foreign nation state-sponsored cyber group and threat actors affiliated with the Iranian Government have carried out malicious cyber-attacks against multiple critical infrastructure entities; this and other nation state “bad actors” have their eyes on this precious resource. In one case, hackers targeted and disabled a common operational technology (OT) used at water facilities. Unfortunately, these facilities often lack the resour...
Digital Transformation: Are We Truly Re...
Digital transformation has become a north star for organizations looking to become more efficient and intelligent. It aims to shift organizations from siloed systems to streamlined enterprise solutions, promoting data democratization and automation. This evolution was expected to enhance efficiency, accessibility and support. But have we achieved these goals? A key digital transformation success factor is a comprehensive data management system...
Revolutionizing Cloud Data Security wit...
As data volumes continue to soar and regulations become increasingly stringent, organizations grapple with the challenge of comprehending their sensitive data, controlling access to it and pinpointing potential vulnerabilities. To regain visibility and control, forward-thinking organizations are turning to data security posture management coupled with data detection and response. In this session, you'll learn:The security and compliance risks...
Considerations for Strategic, Accelerat...
Join us June 27 for an insightful webinar tailored for technical leaders. Our experts will unravel the foundational steps and key decisions that are crucial for launching successful AI ventures. In this session, we’ll explore how a well-designed data storage platform optimized for AI serves as the backbone for AI-powered innovation and operations. What you’ll learn:Efficient end-to-end AI workflows with industry examples and use ca...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.