Virtual
-
Online
As one of the leading agencies for science, technology, and innovation, the Department of Energy (DOE) established the Artificial Intelligence and Technology Office (AITO) to help transform the DOE into a world-leading Artificial Intelligence (AI) enterprise by accelerating the research, development, delivery, and adoption of AI.
The collaboration required across departments and national labs to harness, manage, and leverage the volumes of data is a critical journey for organizations and agencies seeking to accelerate AI and innovation.
Live
-
Courtyard by Marriott San Diego Liberty Station
Join Medallia for their upcoming San Diego Road Show on Thursday, May 12th at 9:00 a.m. PT at the Courtyard by Marriott San Diego Liberty Station to hear from public sector leaders on how they are utilizing EX insights as an organizational culture accelerator to help deliver on mission goals. During the session, a panel of government and industry leaders will discuss:
Live
-
The Diplomat Beach Resort | 3555 South Ocean Drive | Ft. Lauderdale, FL 33019
Appian World connects business and IT leaders looking to stay ahead of the pace of change. Learn firsthand how to accelerate your business by discovering, designing, and automating your workflows through a unified low-code platform. Collaborate with your peers, industry visionaries, partners, and the entire Appian Community to find resources, develop skills, get certified, and be inspired.
Register Now
Live
-
Gaylord Rockies Resort & Convention Center | Aurora, CO
The Nation’s Largest Gathering of GEOINT Professionals
Join us April 24-27 for the GEOINT Symposium's first-time visit to Colorado at the Gaylord Rockies Resort & Convention Center in Aurora to explore this year’s theme, GEOINT: the Foundation of Intelligence.
Register Now
Virtual
-
Online
DLT invites you to join us for Informatica's Data in Action Virtuatl Summit coming up on April 27th! During this online half-day event, leading executives from government and industry will share their stories of how data helped address a variety of community issues.
Attendees of this event will come away with a better understanding of:
Virtual
-
Online
The current model for implementing cyber defense has exposed with many significant challenges including gaps in coverage, increased risk, risking numbers of breaches with significant costs and constrained manpower.
NETSCOUT's Omnis Cyber Intelligence changes the paradigm to approach cyber security and network defense through a risk-based approach with packet-driven, metadata analysis.
Join NETSCOUT's Tony Waller for an Overview of Omnis Cyber Intelligence, April 22, at 1 pm ET.
Virtual
-
Online
Hexnode UEM is an industry-leading endpoint management solution that offers a rich set of features aimed at securing, managing, and remotely monitoring devices within the enterprise.
Live
-
Hilton Hawaiian Village | Honolulu, Hawaii
TechNet Indo-Pacific is the largest event of its kind in the Indo-Pacific Rim. The conference focuses on the regional issues military leaders have identified, including full spectrum cyber operations as adversaries leverage cyberspace to conduct operations below the threshold of conflict. TechNet Indo-Pacific features speakers and discussions about the area’s challenges and how industry and government can collaborate. Exhibitors demonstrate solutions and services that meet the military services' requirements.
Live
-
Hilton Hawaiian Village | Honolulu, Hawaii
TechNet Indo-Pacific is the largest event of its kind in the Indo-Pacific Rim. The conference focuses on the regional issues military leaders have identified, including full spectrum cyber operations as adversaries leverage cyberspace to conduct operations below the threshold of conflict. TechNet Indo-Pacific features speakers and discussions about the area’s challenges and how industry and government can collaborate.
Register Now
Virtual
-
Online
With the growing threat of cyber attacks, DHS’s Cybersecurity and Infrastructure Agency (CISA) and the White House have recently released guidelines for agencies to adopt a Zero Trust approach to cybersecurity. Isolation is paramount to Zero Trust Architecture. Isolation creates a virtual "air gap" between the network end user and the online world. Instead of opening a website directly, the end user sees a sanitized version of it with all malicious code removed. This is true Zero Trust security, achieved by separating users from all potential threats.