Do You Know Who has the Keys to your Ca...
In this 5 part webinar series, we discuss how to best set up identify and access management, how to protect your AWS environment from network attacks, how to stay compliant, and more. Part 5: Do You Know Who has the Keys to your Castle? Learn About AWS Key Management System and Encryption. In this webinar, we’ll discuss: KMS CloudHSM Certificate Manager Secrets Manager Part 1: May 18 Part 2: May 25 Part 3: June 1 Part 4: June 8 Part 5: June 15
PulumiUP
PulumiUP is a free virtual conference open to all interested in platform engineering, infrastructure as code, software development, modern applications, or Pulumi. PulumiUP focuses on engineers & developers, from individual contributors to team leaders and founders. It provides a range of benefits, including: Learning: You can learn best practices, the latest about Pulumi, and infrastructure as code. Build new skills, gain experience, and...
Challenge the Digital Status Quo: One A...
To meet the requirements of the Continuous Diagnostics and Mitigation (CDM) program, Federal agencies have traditionally pushed information about IT assets into an integration point and then into databases, where manual coding is needed to present the data on dashboards. This approach creates additional expense for custom scripting and additional hardware. One agency reimagined its approach to CDM, in line with its overall modernization plans....
Help Your Employees and Organization Na...
The array of environmental, political, and social challenges that organizations must manage has continued to rise, and their impact on human capital is more significant than ever. Join this complimentary HR webinar to understand how CHROs can effectively identify and monitor human capital risks posed by a number of environmental, political, and social threats. You’ll gain insight into how you can build a resilient HR organization to succ...
June 15, 2023
Organizer:
Gartner Location:
Webcast
Beyond the Hype: The Practical Applicat...
ChatGPT has grabbed headlines, caused competitors to scramble, been embraced by innovators, and banned by some organizations and countries. It is just the latest example of a near decade long technology trend called generative AI, which can augment human capabilities by creating realistic content such as text, images, audio, and much more. It can also be used to generate synthetic data that represents the original data and can eliminate privac...
June 15, 2023
Organizer:
Gartner Location:
Webcast
Let Me Be Clear: How to Gain Clarity an...
Enterprise IT is more complex than ever as the era of hybrid work and decentralized applications can quickly lead to unpredictable data flows and surprises around seemingly every corner. Security teams need more control, not less. But how can you implement a holistic approach built around people, process and technology? The answer isn't always clear. Join WWT security experts Matt Berry and Jill Cochrane, two cybersecurity industry veterans, a...
WWT Celebrates Women In Leadership � Ju...
Virtual chat with CISO of Acxiom, Beth-Anne Bygum to discuss her her journey to being the highest ranking women inside a global organization. We will discuss her journey, including the challenges, triumphs, what Juneteenth means to her and so much more. What to expect This conversation celebrates Juneteenth and what that important event has done to enable opportunities for the advancement of people of color in the US. Empower and inspire our l...
Making the Impossible Possible - Testin...
Manual testing every user journey on your website is impossible.You might get close if you had endless time, but sadly, such a luxury doesn't exist in your world.As a result, it's down to you to choose the most critical paths for testing, but what if you miss one? Users are unpredictable and behave unexpectedly, which can lead to missed defects.And with looming release dates, testing new features and functionality is essential for a seamless u...
June 15, 2023
Organizer:
Keysight Location:
Webcast
Enhancing OT Security: A Dual Perspecti...
Join us for a panel discussion presented by Emerson and Dragos, as they share their insights around OT cybersecurity as partners - while also depicting the unique expertise, experience, and responsibilities that they bring to the table to defend customer installations and environments together. Although the core focus of the conversation will be on DeltaV systems, a high-level overview of OT cybersecurity and the Industrial Control Systems (IC...
Zoom Trainings - June 2023
Register today for this quick 30-minute training where our Zoom team here at Carahsoft will go through Zoom's capabilities and answer any questions you may have in real-time. Become a Zoom expert today! Dive in and learn about: Customizing your account & profile Scheduling & starting instant meetings Virtual backgrounds, filters, Whiteboard, and more!
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.