Red Hat Enterprise Linux Skills Worksho...
Eager to learn how to deploy, manage, and innovate on a platform that will meet your needs today and scale for the future? Join Red Hat® for a hands-on technical workshop paired with a Red Hat User Group (RHUG) and learn about all things Red Hat Enterprise Linux® (RHEL). WorkshopDuring this session, attendees will learn about two, of the many, security-related features included in Red Hat Enterprise Linux: Terminal Session Recording an...
March 7, 2024
Organizer:
Red Hat Location:
Malvern, PA
Red Hat Enterprise Linux Workshop + RHU...
Eager to learn how to deploy, manage, and innovate on a platform that will meet your needs today and scale for the future? Join Red Hat® for a hands-on technical workshop paired with a Red Hat User Group (RHUG) and learn about all things Red Hat® Enterprise Linux® (RHEL). Workshop During this session, attendees will learn about two, of the many, security-related features included in Red Hat Enterprise Linux: Terminal Session Record...
March 6, 2024
Organizer:
Red Hat Location:
Kansas City, MO
How State & Local Governments Can Secur...
State and local governments and education produce large amounts of unstructured data in a wide range of data types. From student report cards that contain personally identifiable information (PII) to municipal tax rolls full of information that fraudsters want to steal, these organizations have a data protection challenge on their hands. Keeping these diverse data sets safe and ensuring their high availability are essential for smooth educatio...
January 18, 2024
Organizer:
FedInsider Location:
Webcast
Red Hat Enterprise Linux Workshop A Foc...
Join Red Hat® for a hands-on technical workshop and learn how Red Hat Enterprise Linux® can help you deploy, manage, and innovate on a platform that will meet your needs today and scale for the future. In this workshop you will learn about two, of the many, security-related features included in Red Hat Enterprise Linux: Terminal Session Recording and System-wide Cryptography Policy. Both of these features were introduced in Red Hat Ent...
January 17, 2024
Organizer:
Red Hat Location:
Virtual
Advanced Data Protection with Vault: Ha...
Join HashiCorp for a hands-on workshop on zero trust, identity-based security. During this workshop, participants will learn about the HashiCorp security model, which is predicated on the principle of identity-based access and security. In order for any machine or user to do anything, they must authenticate who or what they are, and their identity and policies define what they’re allowed to do. After an overview of zero trust security, p...
November 15, 2023
Organizer:
HashiCorp Location:
Virtual
Encryption Export Controls
U.S. export controls on hardware and software using encryption remain one of the areas that can confound even the most experienced export compliance practitioner. This webinar will go through the basics of classifying items that could fall within Category 5 Part II of the Commerce Control List. We will also review export licensing requirements for these items, including NLR and License Exception ENC. Designed for individuals with a working kno...
Beware! Encryption Jedi Mind Trick
When a cloud service provider (CSP) says they are using encryption, that's when you know you need to dig deeper into the details rather than succumb to the Jedi mind tricks of encryption. "You can trust us. We use encryption." We will cover BYOK -- what it actually is - and misconceptions, along with end-to-end encryption. Where do you use encryption? How do you perform encryption? How do you protect the keys throughout the key management life...
2023 CyberMaryland Governance and Polic...
Governance & Policy Forum Overview As part of the annual CyberMaryland Conference, the Federal Business Council, Inc. will host a CyberMaryland Forum at the Dreamport Mission Accelerator in Columbia, MD in March. CyberMaryland events connect the best of academia, government, and private industry organizations to ensure the cyber-safety of today and educate the cybersecurity professionals of tomorrow. Additionally, they provide an opportuni...
Google Webcast: FedRAMP, Encryption, and More
We all know security is the biggest barrier to cloud migration. Fortunately, things have just gotten much easier. With Google's new FedRAMP certification, added security features, and partnership with encryption vendor Virtru, you can safely and cost effectively move email and storage to the cloud. Ready to learn more? View our on-demand webcast with experts from Onix and Virtru, to learn more about these cloud products and services. You will...
Securing Your Networks From IPv6 Threats
Securing Your Networks From IPv6 Threats The explosion of Internet-connected devices – from mobile communications to the Internet of Things – demonstrates the need for the quantum increase in available IP addresses created by moving to IPv6. This webinar, the second of four sessions, addresses the unique strengths and security challenges of IPv6. The shift to IPv6 means that end-to-end encryption is built into devices and systems,...
January 25, 2023
Organizer:
FEDINSIDER Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.