̽»¨ÊÓÆµ

̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Events and Resources

Events

Upcoming Events

Akamai-Blue_and_DarkBlue-Microsite-Logo.png
Akamai Virtual Event

Event Date: April 29, 2026
Hosted By: Akamai, FedInsider & ̽»¨ÊÓÆµ
Microsegmentation is a critical security strategy for state and local law enforcement agencies aiming to comply with the FBI’s Criminal Justice Information Services (CJIS) Security Policy. This policy mandates strict security, encryption, and access controls for protecting sensitive Criminal Justice Information ...
Zscaler_BrandAssets_LogoLockup_80px.png
Zscaler Virtual Event

Event Date: May 12, 2026
Hosted By: Zscaler & ̽»¨ÊÓÆµ
CPE credit available
Zscaler and ̽»¨ÊÓÆµ are excited to invite you to join us in the lead-up to SOF Week 2026 to explore how your team can innovate, adapt and collaborate in service of your mission goals by utilizing emerging technologies.   Military operational success is underpinned by joint ...
pathlock_color-microsite-80px.png
Pathlock Virtual Event

Event Date: May 12, 2026
Hosted By: Pathlock & ̽»¨ÊÓÆµ
In ...
Akamai-Blue_and_DarkBlue-Microsite-Logo.png
Akamai Virtual Event

Event Date: May 13, 2026
Hosted By: Akamai, FedInsider & ̽»¨ÊÓÆµ
CPE credit available
Artificial intelligence (AI) is transforming cybersecurity by acting as both a powerful defensive tool and a potent weapon for cybercriminals. AI accelerates threat detection and automates responses, but it also enables sophisticated attacks like phishing, deepfakes and automated malware. During this virtual event, ...
Akamai-Blue_and_DarkBlue-Microsite-Logo.png
Akamai Virtual Event

Event Date: May 14, 2026
Hosted By: Akamai, FedInsider & ̽»¨ÊÓÆµ
CPE credit available
The National Association of State CIOs announced in December 2025 that a new priority has taken the top spot in its annual survey of issues concerning state CIOs across the country – artificial intelligence (AI), bumping cybersecurity to the second spot for the first time in a dozen years. But the connection ...
Onsite Event

Event Date: May 18, 2026 - May 22, 2026
Hosted By: Current Technologies & ̽»¨ÊÓÆµ
Location: Reston, VA
Through hands-on practice ...
Forescout-Logo-Color.png
Forescout Virtual Event

Event Date: May 20, 2026
Hosted By: Forescout & ̽»¨ÊÓÆµ
The attack surface and threat landscape for critical infrastructure organizations is expanding faster than ever. Forescout Research - Vedere Labs recently released findings that reveal a rapidly shifting risk landscape. It's vital that your organization is prepared when it comes to cyber ...
Qualys is Updated to Authorized
Qualys Virtual Event

Event Date: May 27, 2026
Hosted By: Qualys & ̽»¨ÊÓÆµ
CPE credit available
As the Department of Defense marches toward the FY2027 Zero Trust (ZT) Target Level deadline, DoD agencies face a dual challenge: transitioning to a Unified Network while simultaneously operationalizing the 91 specific capability outcomes defined by the DoD CIO. Many agencies are finding that relying on dozens of disconnected ...
f5-logo-rgb_transparent.png
Multi-Vendor Onsite Event

Event Date: June 10, 2026
Hosted By: F5, J2R & ̽»¨ÊÓÆµ
Location: Reston, VA
Discover the power of F5’s AI solutions in a focused, hands-on training designed for Federal contractors and customers. Immerse yourself in cutting-edge topics that seamlessly integrate business value, technical excellence, and real-world practical application. This program is tailored for ...

Archived Events

Multi-Vendor Virtual Event

Event Date: April 27, 2026
Hosted By: Black Kite, Guidepoint, The Chertoff Group & ̽»¨ÊÓÆµ
Today’s most dangerous cyberattacks don’t break through your defenses — they quietly slip past them.

Resources


Featured

In this episode of Identiholics, host Christine Owen is joined by Jamie Danker from Venable and Carole House from Terranet. They discuss the importance of women in the cybersecurity field and the need for more women to be involved in privacy and security discussions. The conversation highlights the ...

The discourse around secure mobile communication platforms has escalated in the United States public sector, where security and data integrity aren’t just priorities but mandates. As agencies become increasingly dependent on digital technologies to execute their missions, the need for secure p...

The Wiz + Accenture Responsive Protection System — a modern, unified cloud security platform tailored for federal agencies. A simple and secure way to enhance cloud security while reducing costs.

In the search for solutions to modernize legacy systems, federal agencies can consider integrations between Fortinet Federal and Garland Technology. Read highlights from the recent Better Together webinar with leading experts in IT and OT networks, Zero Trust architecture and federal ecosystems.

This article discusses the nature of how cybercriminals attack, from the inside! Cybercriminals use legitimate platforms to infiltrate your data. CyberFOX goes into detail on how you can stop these attacks from surfacing,

This article discusses how cyber- privileges affect access to educational institutions data. Phishing, Malware and Lack of Awareness can play a major factor in poor self-defense against cyber-attacks.

A new era of cyber threats has emerged with the rise of the “enterprising adversary,” as highlighted in the CrowdStrike 2025 Global Threat Report. This new breed of threat actor distinguishes itself through sophisticated and scalable tactics designed to execute attacks with calculated, b...

Druva provides a cloud-native, SaaS-based data protection and cyber resiliency solution that is FedRAMP authorized for US federal government agencies. We offer solutions for Microsoft 365 and endpoints, including features like accelerated ransomware recovery, eDiscovery, legal hold, and centralized ...

The U.S. Department of Defense recently clarified that the primary authentication factor for its networks is the PKI credential itself - not the physical Common Access Card (CAC) that stores it. This shift allows alternative secure hardware authenticators to store DoD-approved credentials, expanding...

View this article to understand how Cortex Cloud stops cyber-threats during their attack, stopping your data from being touched.