FedRAMP 20x: Faster, More Secure Cloud...
The Federal Risk and Authorization Management Program (FedRAMP), launched in 2011, continues to evolve as the cornerstone of cloud security for U.S. government agencies. FedRAMP provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services, grounded in NIST guidelines. This timely virtual workshop will spotlight the FedRAMP 20x initiative, a transformative effort to streamline...
Microsoft Federal Training Series - The...
Federal leaders today face the dual challenge of driving innovation while ensuring trust, security, and compliance. As a Federal decision-maker, you’re invited to join the Microsoft Federal Training Series designed to equip executives and technology leaders with the insights and practical tools to lead confidently in the age of AI. Across this 8-part series, you will explore:Practical ways to adopt and scale Microsoft 365 Copilot with th...
Modernizing Healthcare Data with Amazon FSxN
Join us for a focused session on Amazon FSxN and NetApp on AWS, built for healthcare organizations managing sensitive data. Learn how FSxN modernizes storage, enhances security, and supports compliance. What You’ll Learn:How to simplify and secure healthcare data management on AWSReal-world use cases and migration best practices
Government Contractor Challenges in 202...
OverviewThis FREE webinar will offer attendees an overview of the most significant regulatory, compliance, and operational updates affecting government contractors in 2026. Covering critical developments from DCAA audit expectations and Defense Department acquisition strategies to NDAA updates, cybersecurity requirements, and the latest changes to the FAR, DFARS, and Cost Accounting Standards, this session is designed to keep contractors infor...
Red Hat Tech Day - DC
Join Red Hat for Tech Day, a full-day, hands-on experience built for the builders, operators and architects responsible for running secure, resilient enterprise environments. Red Hat Tech Day empowers technical and IT leaders to deepen expertise, accelerate innovation, and operate with confidence. During the event, you will:Choose two expert-led workshopsBuild and secure real-world systemsExplore hybrid cloud, automation, and AIGet hands-on wi...
Built to Scale: How State and Local Age...
AI is quickly becoming a strategic differentiator for agencies looking to meet mission goals faster, deliver better service and make smarter use of limited resources. The pressure to "do something with AI" is real — but what that looks like in practice varies widely. From data privacy to governance to infrastructure, many leaders are still sorting out how to align new AI capabilities with old realities. This practical session will spotli...
Clear Signals, Safer Schools: Smarter C...
Creating a safe, connected school environment depends on streamlined and timely communication. When an emergency unfolds or a change needs to be communicated fast, districts need tools that work instantly and reliably across every corner of campus. From E911 to real-time alerts and integrated classroom communication, today’s most effective school safety strategies start with a unified platform. Join this webinar to explore how modern com...
Inside Security Operations at Google: F...
As the cyber threat landscape evolves, Google Public Sector is investing heavily to provide warfighters and decision makers with the capabilities needed to secure mission data and critical infrastructure. Join cybersecurity and Mandiant experts from Google Public Sector and Daston as they share insights drawn from defending global enterprises, responding to nation-state threats, and supporting mission-critical environments across the Departmen...
Enforcing Least Privilege at the Endpoi...
Federal agencies face relentless cyber threats targeting endpoints—the most vulnerable and widespread attack surface in government environments. Implementing Least Privilege is no longer optional; it is a mission-critical strategy to meet Zero Trust mandates, reduce risk and comply with evolving federal cybersecurity requirements. Join experts from BeyondTrust and Red River for an in-depth discussion on Endpoint Privilege Management (EPM...
Securing the Invisible: API Discovery f...
Join F5 for an exclusive API Discovery webinar. During this webinar, the following topics will be discussed: Overview of F5’s API Discovery approach for restrictive environments Capabilities & benefits: Vulnerability detection and real-time insights Deployment considerations for mission-critical industries Attendees will learn how F5's Local API Discovery tool supports the DoD stringent data sovereignty, privacy, and compliance r...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.