Cyber Defenders � Celebrating Federal C...
Raise a glass to the trailblazers safeguarding our nation’s digital future on Thursday, May 15, at Morton’s in D.C. for MeriTalk Tech Tonic – government IT’s happiest hour. This edition of Tech Tonic will celebrate the winners of MeriTalk’s Cyber Defenders Awards, honoring the individuals driving meaningful cybersecurity innovation across the Federal government. Connect with government and industry leaders over gr...
May 15, 2025
Organizer:
MeriTalk Location:
Washington, DC
Secure by Demand: Proactive Strategies...
The proliferation of mobile apps, both for professional and personal use, has created a massive, often overlooked attack surface. The use of “shadow IT,” software that hasn’t been approved by IT, further increases the risk of data leaks and policy violations at a time when IT teams and resources are stretched thin. With the shift from “Secure by Design” to “Secure by Demand,” trusting software developm...
May 15, 2025
Organizer:
ATARC Location:
Webcast
Government ITSM Reimagined: Connecting...
Join Carahsoft online for an insightful session tailored specifically for state government agencies exploring how GitLab and ServiceNow’s integration is transforming IT Service Management (ITSM) practices in the public sector. This GitLab and ServiceNow webinar will demonstrate how to bridge the gap between development workflows and service management, creating a unified digital pipeline that accelerates IT delivery and security. On Thur...
Ivanti LIVE!: Aligning IT & Security
Ivanti would like to invite you to Ivanti LIVE! Washington, D.C. a premier event designed for IT and security leaders to align priorities around mobility, consolidation, and digitization while eliminating wasteful spend. Join us on May 15th at the Army Navy Country Club in Arlington to: Hear from industry experts – Learn how evolving threats are being met by agency modernization efforts. Gain actionable insights – Discover strategi...
How Executive Leaders Can Prepare for E...
The number of regulations and laws concerning AI usage is rapidly increasing, presenting organizations with fresh compliance and enforcement challenges. Regulations can evolve monthly emerging from countries worldwide, as well as from smaller governmental entities like states and cities. IT is commonly responsible for responding to such challenges and legal risk and compliance executives often perceive challenges to implementation that the res...
May 15, 2025
Organizer:
Gartner Location:
Webcast
Ask Us Anything: VMware by Broadcom Army ELA
Join us for our Ask Us Anything: VMware Army ELA webcast where you'll hear from Department of Defense IT expert and VMware Army Program Director John Jordan on how you can best leverage VMware technology in this contract. During this webcast, you'll learn about: The full scope of VMware technologies available to you in this new ELA A variety of army-specific IT trainings you and your team can attend to upgrade your mission-critical ope...
The Pitfalls and Positives of Automated...
Automated accessibility scanners can be a valuable tool for identifying compliance gaps in government websites, but they aren’t a one-size-fits-all solution. Without human evaluation, they can miss critical issues that impact real users. Join Granicus for this complimentary webinar to discover how to effectively utilize automated accessibility scanners in conjunction with human review to improve government websites. Specifically, attende...
Better Together Series: ServiceNow Ente...
In this webinar, learn how ServiceNow supports agencies in optimizing their IT asset estate through a combined deployment of ServiceNow’s Enterprise Architecture (EA) product with our IT Asset Management (ITAM), Hardware Asset Management (HAM) and/or Software Asset Management (SAM) offerings. Key outcomes: Enable AI-optimized asset planning. Ensure asset alignment to needed capabilities and mission priorities. Maintain asset readiness wi...
Onboarding DNS with Cloudflare
You're invited to join us for a step-by-step walkthrough on how to onboard your DNS to Cloudflare. Learn how to seamlessly migrate, optimize performance and enhance security using Cloudflare’s powerful DNS features. Our expert will guide you through best practices, common pitfalls and advanced configurations to ensure a smooth transition. Whether you're new to Cloudflare or looking to refine your setup, this session will equip you with t...
Cyber Protection for Unprotected OT Devices
In today's increasingly complex and distributed digital workforce, every organization is faced with the challenge of securing their expanding infrastructure while supporting legacy systems and edge services. Traditional network security models that rely too heavily on rule-based perimeter defenses and simple user authentication are no longer sufficient. There is where the identity and policy-based security model of CSOI (Cybersecurity Operatio...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.