̽»¨ÊÓÆµ

̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Archived Events

VMwarebyBroadcomLogo.png
Multi-Vendor Onsite Event

Event Date: June 14, 2022
Hosted By: VMware, AWS & ̽»¨ÊÓÆµ
Location: Inglewood, CA
Attendees of this event heard VMware and AWS subject-matter experts discuss their cloud options that included a deeper dive into the VMware Cloud on AWS partnership. Attendees also got an exclusive tour of the SoFi Stadium!To view the event recordings please visit our
VMwarebyBroadcomLogo.png
VMware Virtual Event

Event Date: June 09, 2022
Hosted By: VMware, Tundra Federal & ̽»¨ÊÓÆµ
During this webcast, VMware, Tundra Federal, and ̽»¨ÊÓÆµ discussed how Workspace ONE helps deliver digital transformation by:Creating a shared platform and centralizing management of all your endpoints and applicationsEnsuring a consistent remote work experience for any ...
VMwarebyBroadcomLogo.png
VMware Virtual Event

Event Date: June 02, 2022
Hosted By: VMware & ̽»¨ÊÓÆµ
Thank you for your interest in our VMware webcast:Ask Us Anything: VMware Army ELAUnfortunately, this webcast is now over. We're sorry we missed you!Attendees of this webcast listened to subject-matter experts discuss aspects of the VMware Army ELA contract, including:The ...
VMwarebyBroadcomLogo.png
VMware Virtual Event

Event Date: May 25, 2022 - June 01, 2022
Hosted By: VMware & ̽»¨ÊÓÆµ
Attendees of the webcast series listened to subject matter experts discuss:Session One: Cybersecurity Maturity Model Certification (CMMC)Updates for the Department of Defense's (DoD) strategic direction on the CMMC program included in version 2.0Clarifications on ...

Resources


Zero Trust Starts at the Identity Layer
Webinar

Zero Trust Starts at the Identity Layer

Today's ICAM tools need to deliver capabilities that continuously validate the identity, attributes and analyze the security posture of who is accessing resources. Whether your agency is running in a private, public or hybrid cloud, identity should be at the center of every access decision. Download the recording for a demonstration on how the ForgeRock platform enables Zero Trust at the identity layer through:

  • Application of artificial intelligence (AI) to prevent identity-based cyber attacks
  • Delivery of seamless user login experiences through a low code/no code platform
  • Instant implementation of NIST SP 800-63-3 controls around identity (IAL), authenticator (AAL) and federation (FAL) assurance levels

Fill out the form below to view this Resource.