Live
-
​Building 10 (Clinical Center) FAES Terrace | 10 Center Drive | Bethesda, MD 20892
The nation's medical research agency — the National Institutes of Health (NIH) — has a massive campus running cutting edge research and development, supported heavily by advanced technology and innovation. With this comes a unique audience of scientists and personnel with special applications.& Reach them face-to-face at NIH Tech Day! All personnel on the NIH campus receive FBC's wide-reaching promotions for this exciting event. Now's the time to show them that your product or service is what they've been missing. NIH Mission and Goals:
Virtual
-
Online
Open Enrollment: AutoCAD Basic Training ClassesLive Online Instructor-Led TrainingCost: $1,095 (Per person | Includes 1 Training Manual)Date: Feb 3-6 | 8am - 3pm MSTWhat you can expect to learn:Understanding the AutoCAD workspace and user interfaceUsing basic drawing, editing, and viewing toolsOrganizing drawing objects on layersAnd more!All courses are conducted online via ATG's LIVE360
Live
-
The Broadmoor Hotel | 1 Lake Ave. | Colorado Springs, CO USA
The Symposium provides a national forum for industry and government to work together to help solve the challenges of cybersecurity, community cyber readiness and national defense.
Virtual
-
Online
​Join KETIV's Autodesk Virtual Academy with this special edition with IAD Industries as they discuss their transition to 3D as well as some best practices for those thinking about moving from 2D to 3D. Register Now
Live
-
The Broadmoor | Pompeiian | 1 Lake Ave. | Colorado Springs, CO 80906
​Red Hat, DLT, and immixGroup invite you to join us at our highly anticipated annual Rocky Mountain Cyberspace Symposium Reception held at The Broadmoor in Colorado Springs. Enjoy a fun filled evening of cocktails, savory hors d'oeuvre's, and meaningful discussion on the future of IT for the DoD. It is a night you won't want to miss — We hope to see you there!​ Register Now
Live
-
The Broadmoor | Pompeiian | 1 Lake Ave. | Colorado Springs, CO 80906
Please join DLT and our partners Tripwire and BitSight for a networking reception at The Broadmoor Pompeiian area following day two of the Rocky Mountain Cyberspace Symposium 2020. Enjoy food, drinks, and network with many of the attendees as well as industry leaders. To ensure entry into the event, please wear your Symposium badge. We look forward to seeing you at our event! Register Now
Virtual
-
Online
Data is government’s most important asset. Insider threats are the cause of 28% of data breaches, up 14% from the previous year, according to the 2018 Verizon Data Breach Investigations Report. The threat landscape—both internal and external—continues to be an increasing challenge for agencies to protect their data. The data centric approach to build a zero trust network builds security from the inside-out rather than the old outside-in notion.Attend this webinar to learn why adoption of a zero trust approach to cyber security stands to revolutionize security of government data.
Virtual
-
Online
Databases are a critical part of delivering applications to users, but they can be complex and difficult to manage. Please join us for a live, interactive webinar to learn how SolarWinds tools can help monitor, analyze, and tune a wide range of database engines, as well as monitor your database infrastructure, including server, VMs, DB application, and dependencies. We’ll review and demonstrate how to find the root cause of database problems, optimize your database, indexes and queries, and detect database anomalies.
Virtual
-
Online
​Please join CDWG and CrowdStrike as we discuss endpoint security for New York K-12 schools. We will discuss legacy vs next-Gen A/V and how time to value is an important measure when evaluating security solutions.Time-to-value measures the time it takes for a solution to be fully operational, including the ease with which it can be implemented and used. Time-to-value is critical because a solution that can’t be deployed or fully used, leaves gaps that attackers can exploit to enter and remain in your environment undetected.
Virtual
-
Online
Federal contractors and subcontractors are being breached at alarming rates, resulting in the loss of sensitive data. To address this challenge, agencies like the Department of Defense are turning to new cybersecurity requirements for contractors, including the Cybersecurity Maturity Model Certification (CMMC). How can agencies continuously monitor security performance within their contractor and subcontractor ecosystem? How should they work with federal contractors to improve their security posture? Join this webinar to learn about innovative approaches to these challenges.