Secure Access Service Edge with Prisma...
Join us for the Secure Access Service Edge (SASE) Ultimate Test Drive, where you will get hands-on experience with Palo Alto Networks Prisma Access. Global expansion, mobile workforces, and cloud computing are shifting the locations of your applications, data, and users. These changes introduce new opportunities, but they also introduce new vectors for cybersecurity risk. Get the protection you need, where you need it, with Palo Alto Networks...
CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
CompTIA Security+ Certification Trainin...
CompTIA’s Security+ certification is the most popular cybersecurity certification in the world. It validates entry-level competencies and on-the-job skills across core security functions, and it is frequently requested in cybersecurity job descriptions. With this certification, you can support your organization in various roles to identify potential security threats, improve incident response and more. What will Security+ certification d...
December 15-19, 2025
Organizer:
Infosec Location:
Virtual
Cloud Summit 2025
Cloud has remained a core pillar of the federal government’s IT modernization efforts over the years, and its ability to transform public services is continuously evolving. From improving patient data accessibility to enabling collaboration across geographically dispersed teams, cloud-enabled government is here to stay. The journey to building a robust cloud infrastructure is no small feat, so how are agencies overcoming legacy systems a...
December 18, 2025
Organizer:
GovExec 360 Location:
Virtual
AI at Work: Modernizing Compliance, Fra...
Join us on December 17th for a half-day event exploring how Artificial Intelligence is transforming federal operations in audit, compliance, fraud detection and cybersecurity. From intelligent automation to agentic systems that learn and adapt, AI is reshaping government workflows at every level. This program offers a chance to learn from experts and peers who are leading modernization and security efforts across federal agencies. You’ll...
ThreatOps Challenge: Cloud Workshop
The ThreatOps Challenge is a capture the flag style webinar that will pit your skills against other Public Sector professionals! Join us for training on SentinelOne Cloud Native Security (CNS), then test your skills at finding exploits before attackers strike and hunting for bad actors and leaked credentials. During this webinar, attendees will learn:How to analyze network traffic and use CNS featuresHow to uncover vulnerabilitiesHow SentinelO...
Portland CISO Dinner
Dinner Topic: Impact and Influence — A Follow Up Evening with Chris Brown, CEO, New Cyber Executive As cybersecurity becomes more deeply embedded in business strategy, the expectations of CISOs are rapidly evolving—from technical operator to influential executive. Chris Brown, an experienced security leader, executive coach and author will draw on key themes from the day’s sessions to explore what it truly means to lead in to...
ATARC Cyber AI Convergence Working Grou...
ATARC is excited to kick off our Cyber AI Convergence Working Group with an exclusive virtual roundtable featuring a curated panel of government leaders in the integration of artificial intelligence and cybersecurity spaces. This inaugural session will help shape the group’s direction and set its key priorities moving forward.Held under the Chatham House Rule, this candid and collaborative discussion will provide a unique opportunity to...
December 16, 2025
Organizer:
ATARC Location:
Virtual
Eliminate Attack Pivoting with Network...
Consequence boundaries connect networks with dramatically different worst-case consequences of compromise – for example, IT networks connected to base microgrids, building automation or other OT networks. At consequence boundaries, we must eliminate the possibility of online attacks pivoting into our high-consequence networks – an emerging space of network engineering. Join Waterfall Security and Carahsoft to explore how network en...
Cybersecurity Insights - An Interactive...
As a known hub for the direction of geopolitics, sanctions, and trade, the Department of State is an attractive target for advanced nation-state threat actors motivated more by a desire for information than by greed, and as public-facing representatives of the U.S. overseas, diplomat staff and buildings don’t have the benefit of anonymity. Deputy Assistant Secretary Gharun Lacy will share Diplomatic Security's cybersecurity strategies fo...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.