̽»¨ÊÓÆµ

̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Upcoming Events

Thales_LOGO_.png
Thales Trusted Cyber Technologies (TCT) Virtual Event

Event Date: February 19, 2026
Hosted By: Thales TCT & ̽»¨ÊÓÆµ
CPE credit available
Keeping up with today’s technology buzzwords—from AI to quantum—can be overwhelming. For federal agencies, the real challenge isn’t just tracking trends, but understanding which innovations matter and how they impact current and future cybersecurity strategies. In the first installment of the ...

Archived Events

Thales_LOGO_.png
Thales Trusted Cyber Technologies (TCT) Virtual Event

Event Date: December 11, 2025
Hosted By: Thales TCT & ̽»¨ÊÓÆµ
In 2026, data security was projected to be the most critical aspect of a digital asset strategy.
Thales_LOGO_.png
Thales Trusted Cyber Technologies (TCT) Virtual Event

Event Date: October 23, 2025
Hosted By: Thales TCT & ̽»¨ÊÓÆµ
Quantum computing threatens to render today’s encryption obsolete, exposing classified data and undermining national security. Proactive agencies must take the time to tighten their security infrastructure - before quantum arrives. Attendees of this ...
Thales_LOGO_.png
Multi-Vendor Virtual Event

Event Date: July 31, 2025
Hosted By: Thales TCT, Menlo Security & ̽»¨ÊÓÆµ
In today's rapidly evolving cybersecurity landscape, federal agencies face increasing pressure to implement Zero Trust Architecture (ZTA) to safeguard critical assets, streamline access controls, and meet stringent compliance requirements. The Cybersecurity and Infrastructure Security Agency (CISA) has outlined a clear ...
Thales_LOGO_.png
Multi-Vendor Virtual Event

Event Date: June 26, 2025
Hosted By: Thales TCT, SandboxAQ & ̽»¨ÊÓÆµ
As public and private sectors accelerate AI adoption, they're deploying it atop cryptographic foundations built for a human-centric world. This results in a surge of non-human identities such as service accounts, agentic AI, machine-to-machine workflows, many authenticated by expired, weak or ...
Thales_LOGO_.png
Thales Trusted Cyber Technologies (TCT) Virtual Event

Event Date: May 29, 2025
Hosted By: Thales TCT & ̽»¨ÊÓÆµ
Artificial intelligence (AI) is rapidly transforming our world, from the way we work to the way we interact with machines. Once AI is able to utilize the power of quantum computing, the results—both good and bad—will be immeasurable. As AI becomes more sophisticated, so too do the ...
Thales_LOGO_.png
Thales Trusted Cyber Technologies (TCT) Onsite Event

Event Date: April 24, 2025
Hosted By: Thales TCT & ̽»¨ÊÓÆµ
Location: Arlington, VA
This event, hosted by Thales TCT and ̽»¨ÊÓÆµ, promised an unparalleled opportunity for U.S. Federal attendees to engage with peers, industry leaders, and technology experts as they navigated the complexities of the current federal cybersecurity landscape. Participants gained invaluable insights into the ...
Thales_LOGO_.png
Thales Trusted Cyber Technologies (TCT) Virtual Event

Event Date: March 27, 2025
Hosted By: Thales TCT & ̽»¨ÊÓÆµ
Artificial intelligence (AI) is rapidly transforming our world, from the way we work to the way we interact with machines. But, with this immense power comes immense responsibility. As AI becomes more sophisticated, so too do the security ...
Thales_LOGO_.png
Thales Trusted Cyber Technologies (TCT) Virtual Event

Event Date: February 20, 2025
Hosted By: Thales TCT & ̽»¨ÊÓÆµ
Quantum computing’s potential computational power will render today’s widely-deployed encryption algorithms obsolete. Both the National Security Memorandum on Promoting US Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems and ...
Thales_LOGO_.png
Thales Trusted Cyber Technologies (TCT) Virtual Event

Event Date: December 17, 2024
Hosted By: Thales TCT & ̽»¨ÊÓÆµ
The 2024 Thales Data Threat Report highlights the unique security challenges faced by U.S. Federal agencies. This report reveals new cybersecurity strategies as well as key differences between ...

Resources


No resources were found. Please try another search.