The Future of Critical Infrastructure:...
As agencies modernize and digitize operations, the convergence of information technology (IT) and operational technology (OT) is introducing new security, resilience and governance challenges. From enterprise systems to mission-critical infrastructure, leaders must ensure consistent zero trust practices, vendor compliance and collaboration between IT and OT stakeholders to protect increasingly interconnected environments. During this webinar,...
Weaponized Transparency: How to Mitigat...
Public service should not come at the cost of personal safety, but as public sector employees have become more visible online, bad actors are increasingly using digital footprints to turn personal information into real-world threats. Join us for a complimentary webinar, Weaponized Transparency: How to Mitigate the Risk of “Doxxing” Against Public Employees. Ian Lee, VP of Product Marketing at DeleteMe, and Sara Voyard, former FBI A...
Baltimore Cybersecurity Conference
Join Us in Baltimore for the Futurecon Cybersecurity Event!Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.Don’t miss our special ceremony recognizing o...
February 12, 2026
Organizer:
FutureCon Location:
Linthicum Heights, MD
Google Public Sector & Foresite: Reston...
Join Google Public Sector experts as they reveal how Google Security Operations (SecOps) is transforming the way Public Sector organizations approach cybersecurity. Discover how this modern security operations suite leverages threat intelligence, AI/ML, and automation at Google scale and speed to eliminate blind spots, respond with speed & precision, and get ahead of threat actors. Participate in an exciting hands-on Capture the Flag chall...
Defense Roadshow: The AI Mission Advantage
The Google Defense Roadshow in Huntsville, Alabama brings together mission-focused leaders to explore how defense organizations can harness the full power of cloud, edge, and AI to stay ahead in our high-stakes environment. Today’s defense operations demand secure, always-on access to data, whether in the cloud, at the edge, or across globally distributed networks. They also require the ability to detect and respond to emerging threats w...
Simplifying Virtualization with OpenShi...
Managing virtual machines across mission-critical environments requires flexibility, consistency and security. The National Oceanic and Atmospheric Administration (NOAA) supports data-intensive modeling and forecasting that depend on reliable, efficient infrastructure. Join Red Hat and Emergent for a hands-on Red Hat OpenShift Virtualization workshop focused on managing virtual machines on a Kubernetes-based platform. Through guided labs, you...
Billington CyberSecurity Cyber and AI O...
AI tools promise faster threat detection, reduced analyst workload and greater resilience, but government agencies often lack clear frameworks for setting objectives or assessing impact. In this webinar, government and industry experts explore how federal organizations can establish mission-aligned goals for AI systems, measure REAL cybersecurity outcomes and track effectiveness over time. Learning objectives:Identifying needs and setting goal...
Identifying Foreign Ownership Risk in S...
The complexity of global supply chains and rapidly shifting geopolitical regulatory environments have driven increased global attention and investment to supply chain mapping and supply chain risk management (SCRM) in recent years. For SCRM and strategic sourcing professionals, knowing the identity of direct and indirect suppliers isn’t enough; the risks are often found in a suppliers’ ownership. And that hidden ownership-based ris...
February 11, 2026
Organizer:
Sayari Location:
Webcast
Team on Tour: Government 2026
This complimentary, 1-day event is specifically designed to empower your agency's teams, from IT and Software to Product and Business teams and beyond, to align work to critical goals, unlock institutional knowledge, and build more effective teamwork within the public sector. What you can expect:A jam-packed agenda featuring keynotes, practical breakout sessions and valuable networking opportunities.Lessons on how to leverage your tools for ma...
Beyond the Usual Networks: Where Narcot...
Narcotics trafficking is no longer confined to familiar platforms or networks. Join this webinar to learn how illicit actors exploit emerging online spaces and how OSINT techniques can be used to uncover hidden activity and true-name identifiers. During this webinar, attendees will learn:How narcotics traffickers are expanding onto emerging and non-traditional online platformsKey indicators of illicit activity occurring outside traditional cha...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.