Salesforce Networking Reception
Join us at our reception following the Indian Gaming Tradeshow & Convention where community leaders will gather to learn, network, and exchange industry-specific ideas in a cultural celebration of success, strength, and self-reliance.Drinks and hors d'oeuvres will be served at the Westin Anaheim Resort on their Jewel Terrace, a short distance from the Anaheim Convention Center.
Zeroing in on Network: 2022 Federal Zer...
While agencies strive to meet changing zero trust requirements, which of OMB’s security pillars (identity, device, network, application, and data) are taking precedence and which are falling behind? MeriTalk and Merlin Cyber surveyed more than 150 Federal cybersecurity executives to explore momentum, priorities, and challenges around the evolution to zero trust. When it comes to the pillars of zero trust, three out of four say reaching o...
April 19, 2022
Organizer:
MeriTalk Location:
Webcast
Assess the Impact of U.S. Federal Gover...
Cybersecurity faces even greater scrutiny today in the public sector, with growing concerns emanating from the Russian invasion of Ukraine. Yet, even back to last year, governments placed more urgency on improving security standards. Last year, the United States federal government unveiled a comprehensive set of new cybersecurity directives. What impact has those measures made on the public sector’s cybersecurity? Do adjustments need to...
April 19, 2022
Organizer:
Gartner Location:
Webcast
A Study in Resilience: How South Plains...
Organizational resilience encompasses more than processes and procedures or executing a business continuity plan step-by-step; it's about an organization's ability to be agile in the way it approaches risk. The dynamic nature of risk has forced organizations to reevaluate their people, processes and technology to break silos and embrace transparency -- creating a culture of organizational resilience. As the world emerges from the global pandem...
Demystifying Zero Trust for the C-Level...
Implemented correctly, a Zero Trust architecture / strategy / approach to Information Technology, and the architecture that supports it, has the potential to provide a simpler, more secure, more flexible environment for an organization to do business. The advent of Zero Trust should be regarded as an opportunity to better align IT with an organization’s business strategy. The whole purpose of modern networked computing is to facilitate c...
Emulation Planning with ATT&CK
AttackIQ’s alignment to the MITRE ATT&CK® framework and our deep partnership with MITRE Engenuity’s Center for Threat-Informed Defense set us apart from the pack when it comes to adversary emulation. Through cutting-edge research informed by the best minds in cybersecurity, AttackIQ helps you achieve comprehensive cybersecurity readiness through realistic and specific adversary emulations. We bring the deepest library of MI...
What is the Tactical Edge - and Other U...
Everyone has seen media reports that Russian soldiers are using personal cellphones, rather than encrypted communications, because they made the mistake of destroying 4G and 5G towers. In military terms, they find themselves operating in a “denied environment,” because they accidentally rendered their comms network inoperable.All soldiers in a combat situation are operating at the “tactical edge,” where things like limi...
April 18, 2022
Organizer:
FEDINSIDER Location:
Webcast
U.S. Infrastructure Deal Impacts on Sta...
The recent U.S. Federal Bipartisan Infrastructure Deal allocated $65 billion to expand broadband in communities across the United States, with the objective of improving connectivity for rural areas, low-income populations and tribal communities. What can state and local governments do to maximize the new funding and the opportunities it offers? Join this complimentary public sector webinar as a panel of Gartner experts look at the implication...
April 18, 2022
Organizer:
Gartner Location:
Webcast
Why Storage Matters to Data and Should...
In this session, you will learn where data lives in a computer system, and the key performance metrics used to understand the health and performance of your storage subsystem. Then, we will wrap up with a real-world scenario where storage performance proved to be the bottleneck in the most mission-critical workloads. After that, we'll open it up for questions and dive into the storage topics *YOU* want to talk about either on-premises or in th...
OptivCon SoCal
As an OptivCon attendee, you can expect 8 hours of intriguing content aligned with the current cybersecurity landscape, actionable takeaways from industry leaders and multiple opportunities throughout the day to connect with those leaders personally. OptivCons are intimate events of (100 – 300) attendees, technology sponsors, your local Optiv team, and Optiv leadership. We offer a safe space for questions, deep conversations, and the ind...
April 14, 2022
Organizer:
Optiv Location:
Huntington Beach, CA
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.