Red Hat OpenShift Virtualization Workshop
This workshop was tailored for VM administrators and infrastructure architects looking to explore new virtualization solutions. Attendees gained hands-on experience with OpenShift Virtualization, diving into key concepts such as importing, networking and storage.
Revolutionizing Cybersecurity for Feder...
Government agencies handle an extensive amount of sensitive data and Controlled Unclassified Information (CUI) that must be diligently managed and protected. Isolated cloud environments, known as GovClouds, help these US government agencies, contractors, and other organizations meet their regulatory and compliance requirements when running sensitive workloads in the cloud. Zscaler is a long-time partner with the government to secure IT moderni...
Smartsheet Gov Dynamic View Webinar
Smartsheet Gov, Prime Consulting Group, and Carahsoft hosted a webinar on how to use Dynamic View in your solutions to allow your Vendors and External Collaborators access to the information they need but not see the information they shouldn't. Customer were taught how to begin integrating the collection of external information into your organization's workflows in a seamless and secure manner. In this webinar, James Green shared a real use ca...
Introduction to F5 BIG-IP Next
F5 hosted a virtual lab about the Next generation of BIG-IP software. During the lab, experts Ryan Johnson, Dung Lam, and Gabe Romero provided live demonstrations as well as answering any questions about BIG-IP Next. In this hands-on lab, attendees learned:How to manage BIG-IP Next data plane nodes using the Central Manager GUIHow to deploy and operate applicationsWhat a classic BIG-IP migration to Next entailsHow to protect applications using...
Dell Technologies Webinar Series 2024-2025
In this Dell Technologies Webinar Series, attendees learned about:AI & Generative AIEdge & 5GCyber Security & Data ProtectionMerging Legacy Virtualization & Cloud Native DevelopmentMission Critical InfrastructureCapturing Workloads & Building IT Solutions
Accelerating Success: The Importance of...
In today's API-driven landscape, delivering seamless integration experiences is paramount. During this webinar, attendees explored how Continuous Integration and Continuous Delivery (CI/CD) revolutionizes integration projects, enabling faster, more reliable, and more agile API development and deployment.Watch the on-demand recording to discover how CI/CD seamlessly integrates into your integration platform, automating the build, test, and depl...
Transform Fraud Prevention: From Legacy...
Federal finance administrators face the critical challenge of balancing strong security with seamless user experiences amid evolving cybersecurity threats. This webinar explored how Splunk and ID.me's advanced data analytics and digital identity verification can revolutionize pension program security and operations. Experts discussed human-centered design strategies that enhance fraud prevention while ensuring frictionless services access. Dur...
Salesforce Lunch & Learn for Los Angele...
Our 3rd Los Angeles Lunch & Learn session was a success. Public Sector agencies gathered to virtually explore the digital transformation that happening in the county. Attendees learned practical tips to customize the platform so that processes are streamlined and efficient.
Flexible Log Management for Government
As government agencies scale their IT modernization initiatives and deepen their focus on security, managing and maximizing the value of growing log volumes becomes more challenging. This is in addition to complying with logging requirements outlined in mandates such as M-21-31. Attendees joined Datadog as they explored how to collect, process, and store large machine-generated data sets, transforming them from noise into actionable intelligen...
From the Frontlines: Lessons learned fr...
Deploying Zero Trust for an Operational Technology network differs from deploying it on an IT network. Dragos and BlastWave have learned hard lessons with customers on the best practices for deploying OT Zero Trust in the real world and shared these lessons with attendees. They also explored how the pillars of the multiple OT cybersecurity frameworks (NIST, DoD, NIS2, etc.) are combined to provide a deployable solution for critical OT networks...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.