̽»¨ÊÓÆµ

̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Upcoming Events

̽»¨ÊÓÆµ Tradeshow

Event Date: May 05, 2025 - May 08, 2025
Hosted By: ̽»¨ÊÓÆµ
Location: Tampa, FL
̽»¨ÊÓÆµ and our partners attended SOF Week 2025, May 6-8, in Tampa, Florida.    SOF Week 2025 attendees were given the opportunity to: Network with senior decision makers, technical experts and innovators from across the ...
̽»¨ÊÓÆµ Tradeshow

Event Date: May 06, 2025 - May 08, 2025
Hosted By: ̽»¨ÊÓÆµ
Join ̽»¨ÊÓÆµ and our vendor partners at our SOF Week 2025 Executive Briefing Series during SOF Week! Our Executive Briefings Series consists of three days of complimentary educational sessions designed to connect the SOF community in thought leadership, highlight the latest technology trends, and ...
̽»¨ÊÓÆµ Tradeshow

Event Date: May 06, 2025
Hosted By: Nutanix & ̽»¨ÊÓÆµ
CPE credit available
Location: Tampa, FL
This session will explore how the Nutanix Kubernetes Platform (NKP) provides a secure, scalable, and containerized infrastructure that extends from garrison operations to the tactical edge, enabling mission-critical applications to function regardless of connectivity constraints. By integrating Nutanix AI and ...
oktamicrosite.png
Multi-Vendor Onsite Event

Event Date: May 06, 2025
Hosted By: Okta, Zscaler, CrowdStrike ActiveCyber & ̽»¨ÊÓÆµ
Location: Arlington, TX
Join Okta, Zscaler, CrowdStrike, and ActiveCyber on Tuesday, May 6th at 11:30 am CST at Texas Live! in Arlington to discover how AI-powered Zero Trust solutions are transforming security for government agencies and educational institutions. Learn how to balance the need for expanded access to ...
̽»¨ÊÓÆµ Tradeshow

Event Date: May 06, 2025
Hosted By: Armis & ̽»¨ÊÓÆµ
CPE credit available
Location: Tampa, FL
This session is a deep look at the need to return to fundamental principles of military strategy to secure victory in the Cyber Defense environment. We'll dive into an exploration of what it means to truly “know ourselves” and “know our adversary” in the Cyber ...
Trellix-microsite.png
Trellix Virtual Event

Event Date: May 06, 2025
Hosted By: Trellix & ̽»¨ÊÓÆµ
CPE credit available
Are you looking for more actionable visibility and control across a complex network environment? Trellix NDR does not leave any attack unseen. Join Trellix and ̽»¨ÊÓÆµ to see how we provide our government customers visibility and control ...
Omnissa-Microsite-Logo.png
Omnissa ̽»¨ÊÓÆµ Tradeshow

Event Date: May 05, 2025 - May 08, 2025
Hosted By: Omnissa & ̽»¨ÊÓÆµ
Those who joined us in Tampa at the Omnissa demo kiosk under the ̽»¨ÊÓÆµ pavilion were able to meet with Omnissa representatives to discuss with them the benefits of Omnissa's solutions for their organizations.
New-HashiCorp-an-IBM-company-Microsite-Logo.png
HashiCorp Onsite Event

Event Date: May 06, 2025
Hosted By: HashiCorp
HashiCorp has decided to attend TechNet Cyber in 2025! TechNet Cyber 2025 is a prominent cybersecurity event organized by AFCEA ...
̽»¨ÊÓÆµ Tradeshow

Event Date: May 05, 2025 - May 08, 2025
Hosted By: NLIT Society and Committee
  ̽»¨ÊÓÆµ and our partners attended RMCS 2025, February 11 - 13 at the Broadmoor Hotel in Colorado Springs, Colorado.    RMCS attendees were given the opportunity to discuss cybersecurity challenges, community cyber readiness and ...
msft_logo_color.png
Microsoft Onsite Event

Event Date: May 06, 2025
Hosted By: Microsoft & ̽»¨ÊÓÆµ
Location: Washington, DC
We are excited to invite you to the Microsoft AI Tour in Washington, DC, a premier event designed for business leaders, partners, practitioners, and the developer community to explore the latest advancements in artificial intelligence. Taking place at the Ronald Reagan Building and International ...

Resources


Featured

In this episode of Identiholics, host Christine Owen is joined by Jamie Danker from Venable and Carole House from Terranet. They discuss the importance of women in the cybersecurity field and the need for more women to be involved in privacy and security discussions. The conversation highlights the ...

The discourse around secure mobile communication platforms has escalated in the United States public sector, where security and data integrity aren’t just priorities but mandates. As agencies become increasingly dependent on digital technologies to execute their missions, the need for secure p...

SBOM360 Hub is the tech industry's first SBOM exchange for complex software. The Hub allows publishes to manage, create, publish, and share software that is compliant with SBOMs standards data along the distribution chain. This enables risk reduction and safe transfer of data.

Lineaje Third Party Management (TPRM) provides a solution that reduces the risks in the technology purchased. TPRM analyzes security risks in each device by automatically detecting the security policy violations. Some noticeable capabilities are secure SBOM exchange, Automated Risk Analysis, Auto-up...

Executive order 14028 aims to enhance software supply chain security by updating the requirements. Key requirements of the executive order are SBOM minimum fields based on NTIA specifications, signed self-attestation form, and evidentiary artifacts. This article goes in depth on how each key require...

During the 2020 pandemic, it highlighted the vulnerabilities the software supply chain has. SBOM360 by Lineaje is the company's first supply chain manager. The Apache Software Foundation (ASF), an open-source provider, shared its extensive findings on the broader open-source world.

Software is under attack by finding a weakness and taking advantages. Taking on these attacks on the supply chain involves different systems to be working simultaneously. A extensive approach is needed in order to handle the full complexity of the problem.

Executive Order 14028 is requiring vendors to now follow new procedures to ensure that the standards stay high. Some major updates are Hi-Fidelity Software Bill of Materials (SBOM), Vulnerability Disclosure Report (VDR), Signed Self-Attestation Letter of Conformance to EO 14028 per Section 4(e), Evi...

This article discusses the nature of how cybercriminals attack, from the inside! Cybercriminals use legitimate platforms to infiltrate your data. CyberFOX goes into detail on how you can stop these attacks from surfacing,

This article discusses how cyber- privileges affect access to educational institutions data. Phishing, Malware and Lack of Awareness can play a major factor in poor self-defense against cyber-attacks.