Back to Search Begin New Search Save Search Auto-Notify
Reimagine Cybersecurity
Situational awareness of cybersecurity risks is achieved through assessing and monitoring every corner of your network and the threats that are a part of that landscape. Explore key strategies and approaches to implement the next generation cyber safety structure ahead of the bad actors without ripping and replacing your existing cybersecurity tools. Gain insight on the challenges in the current approach to cybersecurity practices, and how to...
Add Favorite
Adobe ColdFusion Workshop
Registration is now closed Join our complimentary Adobe ColdFusion Workshop to learn how you and your agency can leverage Adobe ColdFusion to create amazing web content. This one-day training will cover all facets of Adobe ColdFusion that developers need to build applications that can run across multiple cloud providers or on premise. Specifically, the workshop will explore: The major features in the latest release of Adobe ColdFusion How to...
Add Favorite
The Executive Order and What it Means f...
The Executive Order on improving the nation's cybersecurity (EO14028) outlines several standards and requirements that federal civilian agencies, working in partnership with the private sector, must meet in order to foster a more secure cyberspace. With endpoint security and event logging unified on a single FedRAMP cloud platform, Elastic stands ready to help agencies meet and exceed EO requirements with an affordable infrastructure model tha...
Add Favorite
RockIT Learning Series Track: Google Cl...
During this webinar, we will cover: Google Cloud Platform (GCP) cloud-native solutions for governance and compliance Cost management Standards compliance for GCP Governance best practices Infrastructure automation
Add Favorite
Hands-on Lab Series Part 1: Advanced Ca...
Join us for an interactive session on conducting end-to-end analysis. To start off, we will unpack how Federal, State, and Local agencies are utilizing data driven approaches to enhance their operations, including reconciliation, risk assessment, and data deduplication. During this webinar, you'll go hands-on and learn how to apply these techniques for yourself. You will learn how to bring in and merge different sources of data, ensure data qu...
Add Favorite
Executive Order 14028 is Driving Legacy...
The clock's been ticking - Federal agencies are reaching the end of the first year of President Biden's signed Executive Order 14028, "Improving the Nation's Cybersecurity; Transforming Government Through Technology-Driven initiatives," on May 12, 2021. Join our complimentary webinar as we discuss this executive order which aims to tighten federal agency cybersecurity by requiring all federal government agencies to adopt multifactor authentica...
Add Favorite
Unlock Unstructured Data with AWS Intel...
During this webcast, you will learn: How IDP uses AI/ML to manage unstructured data How IDP can work for your business The best practices to start on your IDP journey
Add Favorite
Higher Education Takes on DevOps
Higher education institutions rely on technologies that are scalable and secure to manage their vast data storage, protect and growth responsibilities. GitLab enables universities to modernize, innovate and secure quickly with an all-in-one platform where everyone can contribute. Join GitLab on June 14th to learn how GitLab has helped the University of Washington scale to effectively host over 10,000 projects, representing roughly 400 GB of da...
Add Favorite
Automating Application Release Cycles f...
As the U.S. Air Force looks to streamline and accelerate operations, modernization has become a key initiative for mission critical success. An app-centric approach to application delivery helps to enable intelligent scaling at the point of a bottleneck, eliminating the need to scale infrastructure across the entire app.Join Red Hat and F5 experts and learn how to modernize networks to better meet end-user expectations for speed and scalabilit...
Add Favorite
Advanced Ansible Security and Compliance
Security attacks can be disarming, and manual responses to threats can prove inefficient and ineffective. Organizations that automate extensively are better prepared to prevent security incidents and business disruptions. Join our live virtual session on June 15th to explore innovative ways to automate while leveraging advanced features of Ansible to perform more complex tasks.
Add Favorite
Back to Search Begin New Search