̽»¨ÊÓÆµ

̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Archived Events

f5-logo-rgb_transparent.png
F5 Virtual Event

Event Date: April 01, 2020
Hosted By: F5 Networks & ̽»¨ÊÓÆµ
F5 Networks and ̽»¨ÊÓÆµ held a webinar on how to move beyond the marketing hype to implement extensible, secure access to applications and infrastructure while reducing friction. World events are generating a seismic shift in the way in which organizations enable their workforces to transact business. With social ...
f5-logo-rgb_transparent.png
F5 Virtual Event

Event Date: March 31, 2020
Hosted By: F5 Networks & ̽»¨ÊÓÆµ
F5 Networks and ̽»¨ÊÓÆµ held a webinar about one of the most significant cyber-threats to date: ransomware. Experts agree that a multi-faceted and holistic strategy is the best defense to these attacks. We will discuss actionable steps you can take to identify, prevent, detect, respond, and recover from a ...
f5-logo-rgb_transparent.png
F5 Virtual Event

Event Date: March 31, 2020
Hosted By: F5 Networks, Inc. & ̽»¨ÊÓÆµ
Attendees of this webinar learned why SSLO is one of F5's hottest federal sales plays at their partner enablement training. F5 provided a refresher on their overall solution set, along with conducting a technical training and demo on the SSL Orchestrator (SSLO) use case. Attendees of this webinar ...
f5-logo-rgb_transparent.png
F5 Onsite Event

Event Date: February 13, 2020
Hosted By: F5 Networks & ̽»¨ÊÓÆµ
Location: Oklahoma City, OK
On February 13th, attendees joined F5 Networks and ̽»¨ÊÓÆµ for a hands-on DoD Use Case Tech Session. In this workshop, attendees gained practical knowledge on real time DoD Use Cases like Advanced Web Application Firewall, BIG-IQ and Automation and Orchestration and more Application Delivery ...
f5-logo-rgb_transparent.png
F5 Virtual Event

Event Date: February 11, 2020
Hosted By: F5 Networks & ̽»¨ÊÓÆµ
F5 Networks and ̽»¨ÊÓÆµ presented an in-depth overview of the election system threat landscape, attack surface, bots and botnets, and zero-trust principles to protect election infrastructure. With the 2020 election cycles on the horizon, now is the perfect time to brush up on election security concepts and how F5 ...
f5-logo-rgb_transparent.png
F5 Virtual Event

Event Date: January 15, 2020
Hosted By: F5, Shorepoint & ̽»¨ÊÓÆµ
Attendees of this webinar learned how to:Shore up the baseline capabilities of CDM for their environment to ensure true and accurate visibility into their IP addressable inventoryDrive program execution in alignment with their agency Cyber Strategic PlanMeet all CDM Bound F ...
f5-logo-rgb_transparent.png
F5 Virtual Event

Event Date: November 21, 2019
Hosted By: F5 Networks & ̽»¨ÊÓÆµ
In this webinar we discussed how F5 enables customers to scale applications to meet significant demands from schools and students with greater agility, while also wrapping a security layer around all of its services to protect vital educational assets. This webinar was intended for school districts, libraries, and ...
f5-logo-rgb_transparent.png
F5 Onsite Event

Event Date: October 23, 2019
Hosted By: F5 Networks & ̽»¨ÊÓÆµ
Location: Herndon, VA
On Wednesday, October 23, F5 Networks hosted a TechTalk where attendees gained practical knowledge with presentations, labs, and demos on subjects like Local Traffic Manager and SSL Orchestrator. Local Traffic Manager (LTM) ...
F5 Virtual Event

Event Date: October 22, 2019
In this webinar we discussed how your organization can deploy managed security services for every application, anywhere, without upfront investments in IT infrastructure and support. With F5’s fully-managed Web Application Firewall (WAF) and DDoS Protection services, you’ll be protected against the 10 most common web ...
f5-logo-rgb_transparent.png
F5 Onsite Event

Event Date: October 08, 2019
Hosted By: F5 Networks & ̽»¨ÊÓÆµ
Location: Scott AFB, IL
As the number of applications and volume of data continues to grow, so too grows the percentage of applications using Secure Socket Layer (SSL) and Transport Layer Security (TLS) solutions to encrypt data in transit. According to Google's HTTPS encryption transparency report, 73 percent of pages loaded in the US using Chrome ...

Resources


Featured

CMMC compliance is vital for businesses working with the Department of Defense, ensuring they meet security standards to protect sensitive data. Achieving CMMC certification helps organizations safeguard contracts and secure valuable partnerships in a high-stakes cybersecurity environment.

Appian is a low-code platform that enables customers to discover, build, and automate critical processes, with over 20 years of experience working with the Department of Defense. To deepen this relationship, Appian must obtain Impact Level Five authorization, meeting stringent compliance and securit...

Cloud Framework
Datasheet
SMX Elevate helps organizations of all sizes strategize, architect, deploy, and manage complex enterprise solutions with cloud-native technology for rapid, resilient applications that scale to any demand. With industry-leading security and compliance, accelerate Authority to Operate (ATO) under FedR...

Breaking into the U.S. federal government market, which spends $7 billion annually on software, requires vendors to navigate complex acquisition processes, demonstrate compliance, and prove robust security measures. Software products, especially SaaS, must undergo audits and receive authorization fr...

Check out SolCyber's new e-book on CMMC 2.0.

CMMC 2.0 and it's regulations set to take effect shortly. The window of time to address your security vulnerabilities and demonstrate compliance is closing quickly.

The Defense Industrial Base (DIB) is crucial to U.S. national security, handling highly sensitive information and making it a prime target for cyber threats. As the DoD implements the Cybersecurity Maturity Model Certification (CMMC), contractors must now meet stringent security standards, which can...

Entering the government marketplace is a significant challenge for software companies and solution providers. Compliance accreditations like FedRAMP, FISMA, and DISA IL demand expertise, time, and resources that many organizations don’t have in-house. With the SMX Accreditation Accelerator, yo...

Armis Centrix™ assists DIB members in maintaining CMMC compliance. It’s extensive solution identifies IT, OT, IoT and IoMT assets and brings a visibility into assets in the network that is like no other. Armis provides customers with important compliance insights from the start.

Secude HaloCAD
Solutions Brief
With HaloCAD, you can secure CAD files wherever they travel, ensuring lifelong access control and protection inside and outside your IT perimeter. HaloCAD's automatic data protection safeguards your sensitive files against leaks or theft, helping you demonstrate compliance, avoid penalties, and enha...