Beyond Traditional Virtualization with...
Traditional virtualization platforms can no longer support the demands of modern IT environments. As organizations adopt hybrid and multi cloud strategies, IT teams need solutions that deliver greater flexibility, scalability and operational efficiency. Join Red Hat, Dell and Carahsoft for a live webinar exploring how Red Hat OpenShift Virtualization on Dell infrastructure is transforming how organizations run and manage virtual machines along...
Moving Beyond Check-Box Compliance to C...
Government organizations exist to deliver critical services and protect public trust. To support that mission, security teams are expected to meet growing compliance obligations while defending against increasingly sophisticated cyber threats. Over time, many agencies have accumulated overlapping frameworks, disconnected tools, and manual reporting processes, often in spreadsheets and reports that take hours and days of effort each month. Whil...
Snowflake New York Public Sector Data E...
New York’s state and local Governments manage some of the nation’s most complex public services—from housing and public health to education, transportation and public safety. Yet data remains fragmented across agencies, systems and jurisdictions, slowing progress on mission-critical initiatives. This five-part webinar series powered by Snowflake shows how New York public sector leaders can unify, analyze and activate data to...
Red Hat Webinar CIS Benchmarks with Ans...
Meeting CIS benchmarks is critical for maintaining secure, compliant IT environments, but manual validation and remediation can be time consuming and difficult to scale. As systems grow more distributed, organizations need consistent and automated approaches to enforce security standards. Join Emergent and Red Hat for a live webinar exploring how Red Hat Ansible Automation Platform can be used to assess, enforce and maintain CIS benchmark comp...
From Vendor Exposure to Active Threat
You've locked down your agency's perimeter, deployed Zero Trust controls and trained your workforce to avoid phishing emails. But what about the hundreds – or thousands – of suppliers, contractors and mission partners who access your systems, handle your data and keep critical operations running every day? Here's the reality: Adversaries don't just attack federal agencies head-on anymore. They target your weakest link – your...
Software Assessment & Asset Management:...
Agencies throughout the federal government spend billions of dollars collectively on software to run their operations and achieve their mission. The Government Accountability Office (GAO) knows legacy systems are a major contributor to the problem, while the U.S. House of Representatives has passed the Strengthening Agency Management and Oversight of Software Assets (SAMOSA) Act to overhaul software acquisition to cut down costs. There is anot...
March 4, 2026
Organizer:
FedInsider Location:
Webcast
Seconds Matter: Real-Time AI for Public...
Cities are deploying more cameras, sensors, and AI than ever before—yet many still struggle to convert detections into timely, coordinated action. Alerts fire, dashboards light up, and video is captured, but responses remain manual, fragmented, and slow. The real challenge is not detecting events; it is understanding what matters in context and triggering the right response in seconds. In this webinar, we will walk through a live smart c...
The Insider Risk Playbook for Federal C...
Federal agencies are expected to detect insider threats early—before they compromise operations, national security or trust in government. This webinar will outline how public sector, cybersecurity and counterintelligence teams are shifting from reactive alert triage to proactive human risk management, using behavioral context and mission-aligned analytics. This session is designed for CISOs, insider threat leads and cyber operations tea...
From Ad Hoc to Accountable: A Maturity...
Many government agencies continue to manage space using spreadsheets, static floor plans and disconnected data sources, making it difficult to understand utilization, enforce standards or support planning and budget decisions. This reactive approach often leads to underutilized space, limited accountability and challenges responding to audits, workforce changes, or evolving workplace strategies. This webinar introduces a Space Management Matur...
The Future of Secure Browsing for State...
Join us for an exclusive webinar, where you will learn how Prisma Browser™ helps agencies and institutions: Strengthen Compliance: Use built-in logging and audit trails to support CJIS, FERPA, HIPAA and state regulatory requirements without impacting user productivity.Protect Sensitive Data: Isolate mission-critical and student or constituent data from general web browsing and unmanaged access.Centralized Policy Enforcement: Apply and ma...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.