Back to Search Begin New Search Save Search Auto-Notify
RUM to Reality: Why Frontend-First Obse...
This conversation cuts through the hype to examine why looking at observability initiatives from the frontend isn't just another tech industry fashion statement. Kate Holterhoff, Senior Industry analyst at Redmonk, and Greg Leffler, Director of Developer Evangelism for Splunk Observability unpack the growing importance of front-end inwards observability and how it's different from the usual back-end definitions and tooling. The dialogue tackle...
July 10, 2025
Organizer: Splunk
Location: Webcast
Add Favorite
GSA�s 2GIT & End User Device BPAs
Join our upcoming webinar to learn how GSA’s 2nd Generation IT (2GIT) offers in-scope, pre-competed commercial hardware, software, and ancillary services. We’ll also discuss GSA’s Government-wide Strategic Solution (GSS) for desktops and laptops as well as GSA’s latest Government-wide Printer BPA, which offer simplified methods to purchase end user devices. Don’t miss this opportunity to learn how GSA’s secu...
July 10, 2025
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Jacksonville Red Hat User Group
Red Hat� User Group (RHUG) events offer a unique opportunity for Red Hat technology users to gather and discover solutions to IT challenges with subject matter experts & peers. Join the next RHUG to network and explore cutting-edge solutions for IT modernization. Don’t miss this opportunity to transform your IT services while enjoying great food and building connections with industry professionals. Strategic approach to automation wi...
July 10, 2025
Organizer: Red Hat
Location: Jacksonville, FL
Add Favorite
Melbourne Red Hat User Group
Red Hat� User Group (RHUG) events offer a unique opportunity for Red Hat technology users to gather and discover solutions to IT challenges with subject matter experts & peers. Join the next RHUG to network and explore cutting-edge solutions for IT modernization. Don’t miss this opportunity to transform your IT services while enjoying great food and building connections with industry professionals. Join the Melbourne RHUG community t...
July 10, 2025
Organizer: Red Hat
Location: Melbourne, FL
Add Favorite
Indianapolis Red Hat User Group
Red Hat� User Group (RHUG) events offer a unique opportunity for Red Hat technology users to gather and discover solutions to IT challenges with subject matter experts & peers. Join the next RHUG to network and explore cutting-edge solutions for IT modernization. Don’t miss this opportunity to transform your IT services while enjoying great food and building connections with industry professionals.Join the Indianapolis Red Hat User G...
July 10, 2025
Organizer: Red Hat
Location: Indianapolis, IN
Add Favorite
SANS 2025 SOC Survey Webcast & Forum
In 2025, the SANS SOC Survey will extend its detailed inspection of cybersecurity operations centers. By exploring the capabilities and outsourcing; architectures and cloud use; technologies; hiring and staffing; metrics and funding; threat intel; and automation we develop a global picture of the state of SOCs. Key topics examined on this webcast will include:Capabilities that comprise a SOC and what is outsourcedTechnology deployment and sati...
July 9, 2025
Organizer: SANS Institute
Location: Webcast
Add Favorite
CMMC Made Simple: Be Prepared with a Cl...
Register and join us for an in-depth look at how to simplify CMMC compliance—without unnecessary cost or complexity. During this webinar, you'll learn how to avoid the most common and costly CMMC mistakes and how to implement a streamlined and effective path to compliance. We'll explore how choosing the right strategy and tools can make the difference between a painful audit process and a straightforward and affordable journey. W...
July 9, 2025
Organizer: Rimstorm Government Team at Carahsoft
Location: Webcast
Add Favorite
CIO Power Tactics to Win IT Strategic P...
CIOs play a crucial role in crafting IT strategies that align with their organization's most critical objectives. However, 53% of these strategies fail to achieve their goals, often due to insufficient stakeholder support during execution. Building robust stakeholder commitment is essential for ensuring success and driving strategic outcomes. Join this complimentary Gartner webinar as Gartner experts unveil powerful tactics for CIOs to secure...
July 9, 2025
Organizer: Gartner
Location: Webcast
Add Favorite
How to Get Your Security Aligned with t...
Katie Arrington, the acting CIO for the Department of Defense, is fiercely determined to enforce the requirements of the Cybersecurity Maturity Model Certification (CMMC), considering it a primary defense against China’s cyber incursions – and one she expects the Defense Industrial Base (DIB) to meet. Among best practices suggested for achieving CMMC is maintaining a comprehensive, accurate asset inventory, because it defines the b...
July 9, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Model Your Way to Better Cybersecurity
Threat modeling is intended to help defend a system from attack. It tops the list of techniques recommended by the National Institute of Standards and Technology (NIST) to secure critical systems. In a world where people with malicious intent have deadlier tools at their disposal, defenders need to take advantage of Model-Based Systems Engineering (MBSE) to form mitigation strategies effective from early in the systems engineering lifecycle. T...
July 9, 2025
Organizer: CMU - SEI
Location: Webcast
Add Favorite
Back to Search Begin New Search