̽»¨ÊÓÆµ

̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Events and Resources

Events

Upcoming Events

Multi-Vendor Virtual Event

Event Date: April 27, 2026
Hosted By: Black Kite, Guidepoint, The Chertoff Group & ̽»¨ÊÓÆµ
CPE credit available
Today’s most dangerous cyberattacks don’t break through your defenses — they quietly slip past them.
Akamai-Blue_and_DarkBlue-Microsite-Logo.png
Akamai Virtual Event

Event Date: April 29, 2026
Hosted By: Akamai, FedInsider & ̽»¨ÊÓÆµ
Microsegmentation is a critical security strategy for state and local law enforcement agencies aiming to comply with the FBI’s Criminal Justice Information Services (CJIS) Security Policy. This policy mandates strict security, encryption, and access controls for protecting sensitive Criminal Justice Information ...
Zscaler_BrandAssets_LogoLockup_80px.png
Zscaler Virtual Event

Event Date: May 12, 2026
Hosted By: Zscaler & ̽»¨ÊÓÆµ
CPE credit available
Zscaler and ̽»¨ÊÓÆµ are excited to invite you to join us in the lead-up to SOF Week 2026 to explore how your team can innovate, adapt and collaborate in service of your mission goals by utilizing emerging technologies.   Military operational success is underpinned by joint ...
pathlock_color-microsite-80px.png
Pathlock Virtual Event

Event Date: May 12, 2026
Hosted By: Pathlock & ̽»¨ÊÓÆµ
In ...
Akamai-Blue_and_DarkBlue-Microsite-Logo.png
Akamai Virtual Event

Event Date: May 13, 2026
Hosted By: Akamai, FedInsider & ̽»¨ÊÓÆµ
CPE credit available
Artificial intelligence (AI) is transforming cybersecurity by acting as both a powerful defensive tool and a potent weapon for cybercriminals. AI accelerates threat detection and automates responses, but it also enables sophisticated attacks like phishing, deepfakes and automated malware. During this virtual event, ...
Akamai-Blue_and_DarkBlue-Microsite-Logo.png
Akamai Virtual Event

Event Date: May 14, 2026
Hosted By: Akamai, FedInsider & ̽»¨ÊÓÆµ
CPE credit available
The National Association of State CIOs announced in December 2025 that a new priority has taken the top spot in its annual survey of issues concerning state CIOs across the country – artificial intelligence (AI), bumping cybersecurity to the second spot for the first time in a dozen years. But the connection ...
Onsite Event

Event Date: May 18, 2026 - May 22, 2026
Hosted By: Current Technologies & ̽»¨ÊÓÆµ
Location: Reston, VA
Through hands-on practice ...
qualys_2018.png
Qualys Virtual Event

Event Date: May 27, 2026
Hosted By: Qualys & ̽»¨ÊÓÆµ
CPE credit available
As the Department of Defense marches toward the FY2027 Zero Trust (ZT) Target Level deadline, DoD agencies face a dual challenge: transitioning to a Unified Network while simultaneously operationalizing the 91 specific capability outcomes defined by the DoD CIO. Many agencies are finding that relying on dozens of disconnected ...

Archived Events

Yubico-Microsite.png
Multi-Vendor Virtual Event

Event Date: April 21, 2026
Hosted By: Yubico, Okta & ̽»¨ÊÓÆµ
During this webinar, attendees learned how to:
oktamicrosite.png
Okta Onsite Event

Event Date: April 21, 2026
Hosted By: Okta & ̽»¨ÊÓÆµ
Location: Washington, DC
The Okta Gov Identity Summit on April 21st, 2026, in Washington, D.C.—a premier gathering designed for leaders shaping the future of secure federal modernization. This year’s Summit focused on how AI-powered identity, Zero Trust, and cloud-to-edge governance strengthen mission resilience ...

Resources


Cyber Threats Confronting State and Local Governments
Infographic

Cyber Threats Confronting State and Local Governments

In recent years, government leaders have faced an increased number of ransomware attacks, often initiated through unpatched systems or stolen passwords. State and local governments specifically have experienced numerous incidents in January 2024 alone. With cyber attacks persisting as a significant threat, it's crucial to strengthen government cybersecurity by implementing measures such as Multi-Factor Authentication, regular password management, network monitoring, Privileged Access Management, and comprehensive staff training.