A Collaborative Approach to AI Security...
Understanding how threat actors use AI to compromise environments has become a rising concern across the globe. Leveraging techniques such as proactive threat detection, detecting highly evasive threats, accelerating threat investigation and streamlining incident response are critical in adapting to today’s cyber threats. Join CDW and Infoblox for an interactive discussion on how to maximize AI benefits while managing risks. Key Learning...
How Does Your Cybersecurity Strategy Me...
Now that we’re firmly in 2025, it’s time to take stock of your agency’s cybersecurity initiatives for the year. Where are you headed, and do you have an adequate roadmap to meet your cybersecurity goals? There is hardly any room for error when it comes to your agency’s cybersecurity, and the first step is to be aware of the latest best practices around zero trust, identity management, and the current risk landscape. Joi...
January 22, 2025
Organizer:
GovLoop Location:
Webcast
ProFeds FedImpact Retirement Training
Registration is Closed FEDERAL EMPLOYEES: LEARN HOW TO BE THE HERO IN YOUR OWN RETIREMENT STORY & RETIRE WITH CONFIDENCE The ProFeds FedImpact Retirement Workshop gives federal employees a no-nonsense approach to evaluating the financial impact of benefits decisions made as they near retirement. Our goal is to help them avoid the red tape and to retire from federal service with confidence! IMPORTANT INFORMATIONAttendance is free-of-chargeC...
January 22, 2025
Organizer:
ProFeds Location:
Bethesda, MD
Google SecOps: The SIEM's Third Act
SIEM's complicated evolution has resulted in unsustainable cost increases, scope creep, and the occasional declaration that the product space is essentially dead. Thanks to deep expertise in search and data management, access to OSINT and frontline intelligence, and AI-infused features, Google SecOps demonstrates that the SIEM still has plenty of gas in the tank. Discover how SecOps is ushering in the "SIEM's Third Act" by addressing the limit...
Strategies for Building Better Website...
As a result of the COVID-19 pandemic shifting more operations online, people have increasingly turned to utilizing digital methods to access government services, and this trend has continued post-pandemic. The General Services Administration reported 5.6 billion visits to Federal Government websites within a 90-day period in 2022. While the use of digital government services has increased, user experiences still need improvement. A 2024 study...
Introducing the 2025 Digital Counties Survey!
The momentum around artificial intelligence is undeniable—especially for public agency leaders looking to bring powerful AI development capabilities in-house. But how do you secure these cutting-edge initiatives without stalling innovation? Join Government Technology and HP for an in-depth conversation about how to make in-house AI development more secure and effective. We’ll explore the importance of safeguarding AI projects, the...
Unlock Opportunities and Protect Your M...
Being authorized for FedRAMP High is crucial, particularly following the Executive Order on Improving the Nation’s Cybersecurity issued in May 2021, which aims to improve the nation’s cybersecurity and protect federal government networks. Attend our upcoming webinar on January 22nd to learn how Skyhigh Security, backed by FedRAMP High authorizations for Skyhigh Secure Web Gateway (SWG) and Skyhigh Cloud Access Security Broker (CASB...
The Gartner 2025 Leadership Vision for...
Chief product officers (CPOs) and their product management teams are crucial to driving business success. As we enter 2025, the focus on technologies like generative AI will shift from hype to reality, requiring CPOs and product management leaders to adopt new strategies to deliver customer value. Despite substantial investments in generative AI, many are facing disappointing user adoption rates. To convert AI hype into long-term growth, produ...
January 22, 2025
Organizer:
Gartner Location:
Webcast
Cyber Resilience for the Defense ...
Effective cybersecurity requires collaboration across IT infrastructure, security, and data protection, since each team has distinct roles and responsibilities. Integrating IT infrastructure, data protection, and data security provides significant value by offering a unified perspective on user activity, data monitoring, and data access during a cybersecurity incident. By understanding the data—its location, accessibility, and how to res...
January 22, 2025
Organizer:
FedInsider Location:
Webcast
Alliant 2 DPA Training
Who Should Attend: All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how Alliant 2 can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against Alliant 2. This web...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.