Back to Search Begin New Search Save Search Auto-Notify
5 Leadership Traits CIOs Must Develop in 2025
CIOs & other executives of top-performing enterprises exhibit traits like agreeableness, empowerment and accountability. They use these traits to help achieve positive business outcomes and growth. According to Gartner C-Suite Dynamics Surveys, CIO & CEO openness drives psychological safety in executive leadership teams (ELTs), which correlates with higher performance. Join this complimentary Gartner IT webinar as a Gartner expert pres...
April 3, 2025
Organizer: Gartner
Location: Webcast
Add Favorite
Simplify Backup & Recovery: Veeam on Pu...
Join us for an Expert-Led Live Demo showcasing how Pure Storage� and Veeam deliver seamless backup and recovery solutions for mission-critical workloads. Discover how Pure Storage FlashArray™ and FlashBlade� integrate with Veeam Universal Storage API (USAPI) to enable rapid recovery, ransomware resilience, and optimized data protection. In this 25-minute session, Zane Allyn, Principal Technologist, walks through a brief demo of snapshot...
April 3, 2025
Organizer: Pure Storage
Location: Webcast
Add Favorite
Axonius Adapt Washington D.C. 2025
Adapt to the Future of Cybersecurity - Get Ready to Take Action! We are taking Axonius Adapt on the road! Join us in Washington D.C. for Adapt in Action. This one-day event is for Federal, SLED, and Enterprise security leaders collectively working towards a more resilient cyber future – where teams have full actionability over their distributed technology footprint, feel prepared for just about anything, and have time to work on making m...
April 2, 2025
Organizer: Axonius
Location: Washington, DC
Add Favorite
Scaling Vulnerability and Exposure Mana...
This discussion will explore various approaches for effective scaling vulnerability and exposure management (VEM) programs by centralizing data, prioritizing risks effectively, and automating processes to manage exposures across the attack surface.Centralization: Models for consolidating fragmented vulnerability and exposure data into a unified platform, driving efficiency and accuracy.Prioritization: Identifying the most critical exposures by...
April 2, 2025
Organizer: Security Innovation Network (SINET)
Location: Webcast
Add Favorite
22nd Annual E-Discovery, Records and In...
Join us for an immersive one-day in-person conference dedicated to unraveling intricacies of Freedom of Information Act (FOIA) and Records Management in the public sector at the 22nd annual eDiscovery/Records & Information Management Conference. This event brings together government officials, legal experts, FOIA and records management professionals to explore the latest trends, challenges, and solutions in eDiscovery, FOIA and electronic...
April 2, 2025
Organizer: Digital Government Institute
Location: Reston, VA
Add Favorite
How to Identify and Implement Security...
Security Operations Centers (SOCs) are increasingly overwhelmed by alert fatigue and a shortage of skilled talent, making it difficult to effectively respond to cyberthreats. Many organizations struggle to identify and implement security automation scenarios, often hindered by development challenges, lack of ROI and unclear processes. Join this complimentary Gartner webinar as Gartner experts share how security automation can revolutionize you...
April 2, 2025
Organizer: Gartner
Location: Webcast
Add Favorite
Unlock the Power of Generative AI with...
Join us at the Dallas Innovation Studio for an exclusive event, where we will explore the exciting possibilities of generative AI on IBM Power. We’re delighted to share that IBM and Rocketgraph (formerly Trovares) have joined forces to bring the comprehensive capabilities of the Rocketgraph xGT graph analytics platform onto IBM Power. With Rocketgraph xGT platform on IBM Power, organizations can build fine-tuned forecasts, detect sophist...
April 2, 2025
Organizer: IBM
Location: Coppell, TX
Add Favorite
Boost Efficiency with Digitized Workflows
The Idaho Department of Corrections (IDOC) handles massive amounts of data. Legal documents, HR records and financial paperwork, must be securely filed and stored. Yet manual processing is inefficient and a security risk. The IDOC increased efficiency by shifting to a digital workflow. This move to digital workflows saved time and resources. Digital workflows saved 1,400 staff hours and reallocated $80,000 in labor costs. Additionally, digital...
April 2, 2025
Organizer: Government Technology
Location: Webcast
Add Favorite
New Data Exchange Standard Eases Inside...
The CERT Insider Risk Team has developed a new standard for storing and exchanging insider threat case data. The Insider Incident Data Exchange Standard (IIDES) includes structures for collecting and analyzing a variety of technical, non-technical, organizational, and incident response information to meet the varied needs of researchers and practitioners. IIDES is designed to allow practitioners to build, maintain, deidentify, and share inside...
April 2, 2025
Organizer: CMU - SEI
Location: Webcast
Add Favorite
Crowdtour25 Denver
Join CrowdStrike and Industry Leaders as we explore the modern cybersecurity landscape and the value of the CrowdStrike platform. Modern Cybersecurity is AI-Native. CrowdStrike customers are leading the charge in modern AI-native security. Learn how they harness the power of the CrowdStrike Falcon� platform to stay ahead of today’s evolving threats and stop breaches. Harness the power of the Crowd. Join CrowdStrike customers, security le...
April 2, 2025
Organizer: Crowdstrike
Location: Denver, CO
Add Favorite
Back to Search Begin New Search