Texas Cyber Summit
Mission: To Serve Underserved and Women Communities in Cybersecurity. We do this through mentors, scholarships, training, conference access, exam and training vouchers, workshops and more. We want attendees to walk away with an expanded knowledge & capabilities to make them more valuable to themselves and their employers. Vision: Our Vision is to increase the number of persons of all demographics entering the cybersecurity field, particul...
How to Manage Google Calendar Like a Boss
Join Public Sector Connect today to register for this event and others just like it. Join us as we show how to show schedule slots so others can sign-up to meet with you - or your Department or Teams. We will discuss how Calendar can help manage your precious time. We'll show how to pick a time to meet with ease, generate notes documents with a click as well as document due-outs. Whether you’re calendar corralling for yourself or others,...
September 23, 2022
Organizer:
Google Cloud Location:
Webcast
HexCon22
HexCon is Hexnode’s annual conference dedicated to uniting leaders and change-makers across the globe. Now in its 3rd year, HexCon22 brings together the Hexnode community and innovators for three days of insights on the latest practices, strategies and advancements in the cybersecurity and tech field, this September 21-23.
September 21-23, 2022
Organizer:
Mitsogo Location:
Virtual
Cut the Chaos with AppDynamics Full-Sta...
New to the world of full-stack observability? Here's a great introduction. Through a live demonstration of our core product, you’ll discover how Cisco AppDynamics' sophisticated monitoring capabilities can help improve your bottom line. Join Paul Wright to see how AppDynamics can help further your digital transformation by: Bringing full-stack observability with business context across your entire tech stack. Bridging the visibility gap...
September 22, 2022
Organizer:
AppDynamics Location:
Webcast
How To Be Prepared Against Evolving Sof...
Combating modern-day software supply chain attacks is significantly more complicated than in the past. Adversaries are getting craftier and are no longer waiting to exploit publicly disclosed vulnerabilities to launch a cyberattack. By shifting their focus “upstream,” adversaries can infect a single open source component, which will then be distributed “downstream” using legitimate software workflows and update mechanis...
September 22, 2022
Organizer:
ATARC Location:
Webcast
Zoom Trainings - September
Are you curious about what your Zoom for Government account can do for your agency? Don't miss out on Carahsoft's weekly training and discover the additional capabilities this account has to offer to successfully utilize your Zoom for Government account. Dive in and learn about: Customizing your account & profile settings Scheduling & starting instant meetings Exciting features including virtual backgrounds, filters, Zoom Whiteboard, e...
Digital Transformation & Innovation in...
Providing taxpayers with a seamless digital experience. COVID-19 was a turning point for tax authorities, allowing them to instore and further develop digital services and touchpoints for citizens, customers, and clients around the nation. Whether the IRS specifically or State & Local authorities – the digital transformation of taxation services and unemployment insurance delivery has never been more robust. This unique moment in tim...
The Fundamentals of Cloud Security
Government wide pressure to reduce IT costs and optimize operations has led many agencies to embrace cloud computing. Despite the potential savings and improved efficiencies, securing the cloud remains a major concern. Cloud Computing Security can be defined as defending the confidentiality, integrity, and availability of agency assets (data, applications, infrastructure) using cloud services from both outside and insider threats. Securing the...
Investing in Analytics Strategy for Act...
In the next 12-18 months, nearly three in four organizations will spend more on analytics software than on most other software investments. Three in four! But let’s be frank. Some of those companies will see much larger returns on their investment than others. What’s their secret? To significantly boost your financial, customer, and employee metrics, you need to use your analytics investment wisely—and widely. That’s wh...
Modernize Identity Governance with a Un...
In today’s world of heightened cyber defense, Identity Governance and Administration (IGA) tools are a critical component of Identity and Access Management (IAM). How can you improve security beyond traditional, distributed systems, to meet the newer demands of our cloud-first world? A new, unified IAM and governance solution category is emerging and is expected to be the preferred method for governance needs moving forward. Join Okta ex...
September 22, 2022
Organizer:
Okta Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.