̽»¨ÊÓÆµ

̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Upcoming Events

Onsite Event

Event Date: May 20, 2025
Hosted By: ̽»¨ÊÓÆµ
Location: Baltimore, MD
̽»¨ÊÓÆµ will be hosting a networking happy hour at EDUCAUSE Cyber 2025, following the second exhibiting day. We will have food, drinks and live entertainment for all attendees and partners participating. The happy hour will take place at James Joyce Irish Pub & Restaurant on ...
Yubico-Microsite.png
Yubico Virtual Event

Event Date: May 20, 2025
Hosted By: Yubico & ̽»¨ÊÓÆµ
CPE credit available
Join us for an insightful virtual event focused on how modern authentication strategies can close security gaps, drive productivity and ensure compliance with evolving federal cybersecurity requirements. Attendees will gain: Insights from industry experts on the ...
Lookout-Logo-TM-Pref-7L-Full-Pos-RGB-01.png
Lookout Onsite Event

Event Date: May 21, 2025
Hosted By: Lookout, FedInsider & ̽»¨ÊÓÆµ
CPE credit available
Location: Reston, VA
Join the Lookout Federal Forum to explore the latest in mobile security for government agencies. Don't miss this two-part event to gain actionable insights and strengthen your agency's mobile security posture.
informatica-microsite.png
Informatica Virtual Event

Event Date: May 21, 2025
Hosted By: Informatica & ̽»¨ÊÓÆµ
CPE credit available
In today's fast-paced digital landscape, the need for government agencies to modernize their outdated systems is more critical than ever. Legacy technology not only hinders operational efficiency but also limits ...
LaunchDarkly-microsite.png
LaunchDarkly Virtual Event

Event Date: May 21, 2025
Hosted By: LaunchDarkly & ̽»¨ÊÓÆµ
CPE credit available
Federal agencies, currently under pressure to deliver software quickly with smaller staff and tighter budgets, need tools that help them move faster while staying in control. Traditional deployment methods often bring unnecessary risk and delays, making it harder to respond quickly to critical mission ...
Clarifai-microsite.png
Clarifai Virtual Event

Event Date: May 21, 2025
Hosted By: Clarifai & ̽»¨ÊÓÆµ
CPE credit available
The new administration is appearing more eager to advance AI to support national security. A prerequisite of actionable AI insights from the field inevitably requires labeled datasets. Balancing amongst speed to label, security, and high quality labels are crucial to decide and act. Humans in the loop are sometimes required, ...
RoundTrip-microsite.png
Multi-Vendor Virtual Event

Event Date: May 21, 2025
Hosted By: Roundtrip & ̽»¨ÊÓÆµ
Transportation barriers shouldn’t dictate patient outcomes—or drain your budget. Whether you’re a hospital administrator, government agency, or community health organization, inefficient ride coordination, unreliable providers, and siloed systems lead to delayed discharges, higher costs, and fragmented care ...
databricks-microsite.png
Multi-Vendor Virtual Event

Event Date: May 21, 2025
Hosted By: Infinitive, Databricks & ̽»¨ÊÓÆµ
CPE credit available
Each time a caseworker or home visitor enters a family's home, a multitude of forms are completed and a large amount of data is collected. Data captured and reported from these forms is often limited to check boxes and drop-down menus, missing valuable context about a family that caseworker notes provide.
TrueComp_Logo.png
TrueComp Virtual Event

Event Date: May 21, 2025
Hosted By: TrueComp & ̽»¨ÊÓÆµ
CPE credit available
With labor costs as their largest expense, agencies must be proactive in managing workforce decisions. This webinar will explore how real-time labor costing provides a critical tool for navigating both stability and uncertainty. By leveraging better insights, agencies can maintain service levels, manage pension liabilities, ...
salesforce_logo_updated.png
Salesforce Onsite Event

Event Date: May 21, 2025
Hosted By: ̽»¨ÊÓÆµ
Location: New York, NY
Join us on Wednesday, May 21st, after Agentforce World Tour NYC for a complimentary reception hosted by ̽»¨ÊÓÆµ featuring Salesforce!

Resources


Featured

CipherDriveOne datasheet describing how a unified encryption suit can safeguard your sensitive information with ease as a pre-boot Authorization Acquisition (AA) host Software that manages a hardware Encryption Engine (EE).

Learn how DAE for SAP can help your organization secure sensitive data, streamline compliance, and improve operational efficiency, read the full datasheet.

This Dell Technologies resource outlines their approach to delivering comprehensive solutions tailored to customer outcomes, particularly in the federal and defense sectors. It emphasizes the integration of cutting-edge technologies and partnerships to address evolving challenges like security, digi...

Automate Threat Advisories and Post-hoc Detection for Cyber Rapid Response.

SBOM Manager
Datasheet
Stay compliant with regulations and ahead of industry trends by gaining immediate insights into your SBOM portfolio. Empower your team to ingest, generate, store, manage, monitor and distribute SBOMs for the software you build, OSS you use, and 3rd party vendor applications—all in one place with Son...

Achieve Complete Visibility, Behavior Analytics and Real-Time Reports for Your Zscaler Log Data.

SentryCard is created for organizations that need absolute certainty about who is entering their facilities, accessing their devices, or logging into their websites.

When the U.S. Army looked into technology that could spot funds with the potential to be lost due to expiring contracts, it tapped AI to find contracts with unused funds, empowering contracting officers to reclaim the money and reallocate it to other vital areas—boosting the deobligation rate ...

 Discover how the Axway VA Suite offers a versatile and robust certificate validation solution for both standard and custom desktop and server applications.

Aqua’s Cloud Native Application Protection Platform (CNAPP) protects your cloud native applications with a single, unified solution throughout their entire lifecycle. Unifying key security capabilities, CNAPP can protect against both known and unknown threads using a combination of shift-left ...