Virtual
-
Online
​Distance learning and the use of online resources in K-12 and higher education are becoming commonplace and standard in today's world. Online applications such as Moodle manage and deliver the educational experience. Learn about IT best practices to ensure that these digital education tools are available and can offer a quality application experience (AX) for the students and educators.
Virtual
-
Online
Red Hat Deep Dive into Container Security  Speakers include: Liz Rice, Vice President, Open Source Engineering, Aqua Security @LizRice Michelle Davis, Manager, App Dev Specialist, Red Hat @meskridge_davis​ Register Now
Virtual
-
Online
​Panel Discussion and Q&A with CrowdStrike and  ECS Tech | CMMC Overview, Best Practices and Lessons Learned Join us on August 26th at 2:00 p.m. ET for a webinar with CrowdStrike and ECS Tech experts Curt Aubrey, Shayla Treadwell, and Andy Wood. They will provide you insight in their overview, best practices and lessens learned for CMMC. Then, they will wrap it up with the opportunity for you to ‘Ask the Experts'! Speakers:
Virtual
-
Online
​The AFITC Education and Training Event 2019 saw nearly 4000 attendees, speakers, and exhibitors all take part in the critical public/private partnership and dialogue that is key to keeping our country safe and secure. From Acting Secretary of the Air Force, Mr. Matthew Donovan to leading voices in the private sector from RedHat, Symantec, and Google, AFITC attendees hear a range of ideas, opinions, and assessments of the current state of all things cyber as well as insights into what the keys to future success will be.
Virtual
-
Online
​The Public Sector has been one of the most strategic industries for PeopleSoft, and Oracle, for many years. Today, Oracle has several new products that state and local government agencies, as well as special districts, can take advantage of – that are integrated and designed to work with PeopleSoft. Oracle Public Sector Compliance and Regulation is a purpose-built, cloud-native application suite that modernizes public sector licensing and permitting processes with extensible, reliable, easy to use technology. Register today and join the live webinar to learn more!
Virtual
-
Online
The impact of security misconfiguration hasn’t changed because of Covid-19 pandemic so much as it’s been magnified. The top three misconfigurations that cause data breaches continue to be: Failing to remove unused access permissions Setting up incorrect access through misconfigured zones and subnets Creating overly permissive rules And there’s plenty more. Be prepared!
Virtual
-
Online
​Artificial intelligence, machine learning, applied at the edge are driving a new generation of intelligent applications. Data generated from billions of IoT devices and sensors must be processed very quickly at the edge to derive real-time insights, and help achieve key mission goals and objectives like saving lives, providing tactical advantage, saving costs, improving security and safety, etc. How can you operationalize these innovative technologies and optimize the capabilities? Join experts from Nvidia, HPE and Red Hat as we dive into AI/ML and data science at the edge.
Virtual
-
Online
The need for increasing levels of software security is becoming even more apparent as organizations migrate applications to the Cloud and adopt DevSecOps as part of their software development and operational processes. During this panel discussion, you will hear from todays’ top industry leaders including Dr. Ross from NIST who will highlight the latest security guidance under NIST SP 800-53, Rev. 5, and the role security plays as organizations migrate applications to the Cloud and embrace DevSecOps. Experts will explore one of the new security controls outlined in NIST SP 800-53, Rev.
Virtual
-
Online
Live Panel Discussion and Q&A | Avoid Downtime and Resolve Issues Sooner with CIS Guidance​
Virtual
-
Online
Cybersecurity breaches are an unfortunate reality for all industries, with ransomware increasingly the go-to mode of attack for cybercriminals. But K-12 schools are disproportionately affected by cybercrime. More than 500 K-12 schools were victimized by ransomware in 2019 alone. Why do cybercriminals focus on school districts? What is it about K-12 education that makes these entities such attractive targets?