Back to Search Begin New Search Save Search Auto-Notify
Red Hat Enterprise Linux Skills Worksho...
Eager to learn how to deploy, manage, and innovate on a platform that will meet your needs today and scale for the future? Join Red Hat® for a hands-on technical workshop paired with a Red Hat User Group (RHUG) and learn about all things Red Hat Enterprise Linux® (RHEL). WorkshopDuring this session, attendees will learn about two, of the many, security-related features included in Red Hat Enterprise Linux: Terminal Session Recording an...
March 7, 2024
Organizer: Red Hat
Location: Malvern, PA
Add Favorite
Red Hat Enterprise Linux Workshop + RHU...
Eager to learn how to deploy, manage, and innovate on a platform that will meet your needs today and scale for the future? Join Red Hat® for a hands-on technical workshop paired with a Red Hat User Group (RHUG) and learn about all things Red Hat® Enterprise Linux® (RHEL). Workshop During this session, attendees will learn about two, of the many, security-related features included in Red Hat Enterprise Linux: Terminal Session Record...
March 6, 2024
Organizer: Red Hat
Location: Kansas City, MO
Add Favorite
How State & Local Governments Can Secur...
State and local governments and education produce large amounts of unstructured data in a wide range of data types. From student report cards that contain personally identifiable information (PII) to municipal tax rolls full of information that fraudsters want to steal, these organizations have a data protection challenge on their hands. Keeping these diverse data sets safe and ensuring their high availability are essential for smooth educatio...
January 18, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Red Hat Enterprise Linux Workshop A Foc...
Join Red Hat® for a hands-on technical workshop and learn how Red Hat Enterprise Linux® can help you deploy, manage, and innovate on a platform that will meet your needs today and scale for the future. In this workshop you will learn about two, of the many, security-related features included in Red Hat Enterprise Linux: Terminal Session Recording and System-wide Cryptography Policy. Both of these features were introduced in Red Hat Ent...
January 17, 2024
Organizer: Red Hat
Location: Virtual
Add Favorite
Advanced Data Protection with Vault: Ha...
Join HashiCorp for a hands-on workshop on zero trust, identity-based security. During this workshop, participants will learn about the HashiCorp security model, which is predicated on the principle of identity-based access and security. In order for any machine or user to do anything, they must authenticate who or what they are, and their identity and policies define what they’re allowed to do. After an overview of zero trust security, p...
November 15, 2023
Organizer: HashiCorp
Location: Virtual
Add Favorite
Encryption Export Controls
U.S. export controls on hardware and software using encryption remain one of the areas that can confound even the most experienced export compliance practitioner. This webinar will go through the basics of classifying items that could fall within Category 5 Part II of the Commerce Control List. We will also review export licensing requirements for these items, including NLR and License Exception ENC. Designed for individuals with a working kno...
September 12, 2023
Organizer: Content Enablers
Location: Webcast
Add Favorite
Beware! Encryption Jedi Mind Trick
When a cloud service provider (CSP) says they are using encryption, that's when you know you need to dig deeper into the details rather than succumb to the Jedi mind tricks of encryption. "You can trust us. We use encryption." We will cover BYOK -- what it actually is - and misconceptions, along with end-to-end encryption. Where do you use encryption? How do you perform encryption? How do you protect the keys throughout the key management life...
August 29, 2023
Organizer: SANS Institute
Location: Webcast
Add Favorite
2023 CyberMaryland Governance and Polic...
Governance & Policy Forum Overview As part of the annual CyberMaryland Conference, the Federal Business Council, Inc. will host a CyberMaryland Forum at the Dreamport Mission Accelerator in Columbia, MD in March. CyberMaryland events connect the best of academia, government, and private industry organizations to ensure the cyber-safety of today and educate the cybersecurity professionals of tomorrow. Additionally, they provide an opportuni...
March 14, 2023
Organizer: Federal Business Council, Inc.
Location: Columbia, MD
Add Favorite
Google Webcast: FedRAMP, Encryption, and More
We all know security is the biggest barrier to cloud migration. Fortunately, things have just gotten much easier. With Google's new FedRAMP certification, added security features, and partnership with encryption vendor Virtru, you can safely and cost effectively move email and storage to the cloud. Ready to learn more? View our on-demand webcast with experts from Onix and Virtru, to learn more about these cloud products and services. You will...
March 16, 2016 - February 23, 2023
Organizer: Google Government Team at Carahsoft
Location: Webcast
Add Favorite
Securing Your Networks From IPv6 Threats
Securing Your Networks From IPv6 Threats The explosion of Internet-connected devices – from mobile communications to the Internet of Things – demonstrates the need for the quantum increase in available IP addresses created by moving to IPv6. This webinar, the second of four sessions, addresses the unique strengths and security challenges of IPv6. The shift to IPv6 means that end-to-end encryption is built into devices and systems,...
January 25, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search