Quantum Computing in Government: A Disc...
Join us for an exclusive panel discussion featuring thought leaders from D-Wave, Quantinuum and Microsoft as they explore the evolving quantum computing landscape and its implications for the public sector. This timely conversation, moderated by Harvey Morrison of Marion Square, will delve into the unique paths each vendor is taking, misconceptions surrounding quantum computing, emerging hybrid systems and how government agencies can prepare f...
Government Customer Experience & Engage...
As public expectations grow and trust in government remains critical, agencies must align technology, culture, and strategy to deliver meaningful change. Customer experience (CX) sits at the heart of this transformation—driving better service delivery and deeper citizen engagement. But what truly moves the needle? What strategies best boost user engagement? And how can we harness both innovation and human insight to reimagine the governm...
SANS Ransomware Summit 2025
Ransomware attacks are widespread because they are highly profitable and effective for cybercriminals. Many organizations are unprepared for such attacks, leading to serious financial and operational damage. The SANS Ransomware Summit brings together cybersecurity professionals to share insights on preventing, detecting, and recovering from ransomware. The Ransomware Summit will explore these topics:Ransomware intrusion emulationRansomware ini...
Rocky Mountain Information Security Con...
RMISC is the only conference of its kind in the Rocky Mountain region. A convenient, affordable knowledge-builder for IT security, audit and compliance professionals at all levels, RMISC provides the perfect blend of education, networking and opportunities that are critical to success in today’s economy and security climate.
May 28-30, 2025
Organizer:
ISACA Location:
Denver, CO
Data & Digital Tools Workshop
Building a data-driven, digital government with streamlined operations and efficient service delivery requires modern tools, so filling skill gaps and overcoming legacy system challenges is critical in order to execute a successful digital transformation strategy. The way people interact with federal agencies and navigate important resources is transforming as more e-government platforms are built, online processes are automated and open data...
May 29, 2025
Organizer:
GovExec Location:
Webcast
Safeguarding Students, Responders and R...
Imagine trying to stop thousands of cyber threats every single day. That's the reality IT teams worldwide are facing when it comes to cyberattacks. Discover how to enhance your own organization's security posture by hearing firsthand from Texas A&M University's experience in unifying their security operations. Join Elastic to explore how Texas A&M University achieved security efficiency and reduced incident resolution times by 99% and...
CyberThreats 2025 - State & Local Requi...
State and local, territorial, and tribal governments are not bound by the federal agency mandate to implement zero trust architectures, but there are numerous reasons they are either considering it or taking action to put it in place. Zero trust is a particularly important concept for these smaller government bodies because they own and operate critical infrastructure and provide vital day-to-day services to their residents, from issuing drive...
May 29, 2025
Organizer:
FedInsider Location:
Webcast
2025 Effective Market Research (MRAS)
Target Audience: Federal/State/Local Agencies and MilitaryAttention all public sector employees in the contracting and acquisition career field! In GSA's Market Research As a Service (MRAS) Customer Training: Effective Market Research (Fed/Military), you'll learn the importance of market research, how and when to conduct it, and how to get the best results by making your data collection methods more efficient. You'll also delve into the regula...
The Future of Cloud Security Starts wit...
Modern cloud attacks are fast, stealthy, and constantly evolving—can your security strategy keep up? Join us for an eye-opening session that explores why traditional security tools are falling short and how runtime visibility is becoming a critical pillar of modern cloud defense. What You’ll Learn:Why detecting and responding to cloud attacks is more complex than everHow the dynamic nature of cloud infrastructure challenges traditi...
The New Perimeter: Enforcing Security E...
Today’s SLED environments are more distributed than ever with libraries, schools, remote offices and field teams all relying on secure Wi-Fi and cloud-connected infrastructure. But these access points are now prime targets for threat actors who bypass traditional perimeter defenses. In this session, we’ll explore how threatER extends real-time, patented threat blocking to wherever you connect whether at the Wi-Fi access point, on-p...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.