̽»¨ÊÓÆµ

̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Events and Resources

Events

Upcoming Events

̽»¨ÊÓÆµ Tradeshow

Event Date: May 19, 2026
Hosted By: SpyCloud & ̽»¨ÊÓÆµ
CPE credit available
Location: Tampa, FL
SpyCloud and ̽»¨ÊÓÆµ are excited to invite you to join us for our SOF Week 2026 Executive Briefing Series!  
̽»¨ÊÓÆµ Tradeshow

Event Date: May 20, 2026 - May 21, 2026
Hosted By: IACP
Location: Ft.Worth, TX
̽»¨ÊÓÆµ and Partners at IACP Tech 2026!   ̽»¨ÊÓÆµ will be in booth #220 participating with 6 demoing partners at IACP Tech 2026, May 20-21, in Ft. Worth, TX.   Thank you to our demoing ...
DeepMedia-microsite.png
Deep Media Virtual Event

Event Date: May 27, 2026
Hosted By: Deep Media & ̽»¨ÊÓÆµ
CPE credit available
Defense and intelligence operators are currently overwhelmed by a flood of multi-media data across social platforms, online marketplaces and ad networks. Traditional tools often fail to capture critical signals hidden in non-textual content or foreign language exchanges. This ...

Archived Events

Online Targeting of Minors & Child Extortion
DarkOwl Virtual Event

Event Date: April 23, 2026
Hosted By: DarkOwl & ̽»¨ÊÓÆµ
View this webinar recording featuring Jennifer Ewbank, DarkOwl Board Director and Former Deputy Director of CIA for Digital Innovation, and DarkOwl’s Chief Business Officer, Alison Halland, for an exclusive interview-style webinar as they explored darknet data's threat-intelligence capabilities across ...
Datenna-Microsite-Logo.png
Datenna Virtual Event

Event Date: April 15, 2026
Hosted By: Datenna & ̽»¨ÊÓÆµ
This focused discussion was tailored for professionals operating at the intersection of China-focused analysis, counterintelligence and technology protection. This session highlighted how analysts and CI teams can better understand the ...
Threat-Digital-Microsite-Logo.png
Threat Digital Virtual Event

Event Date: April 09, 2026
Hosted By: Threat Digital & ̽»¨ÊÓÆµ
DilgenAI delivers automated screening and monitoring solutions across billions of multilingual data sources, using large language models to summarize risk information. By combining LLM-driven precision with human-like research, DilgenAI bridges the gap between manual analysis and fully automated due ...
Forescout-Logo-Color.png
Forescout Virtual Event

Event Date: February 26, 2026 - April 07, 2026
Hosted By: Forescout, DataOculus & ̽»¨ÊÓÆµ
The quantum clock is ticking and adversaries aren't waiting.   Join us for an essential session on quantum risk and post-quantum cryptography (PQC), where we'll cut through the complexity and show you exactly what's at stake and what to do about ...
Seerist-Microsite-200.png
Seerist Virtual Event

Event Date: April 07, 2026
Hosted By: Seerist & ̽»¨ÊÓÆµ
Mega-events such as major sporting events, global summits and large public gatherings introduce complex security challenges that extend far beyond the venue itself. Risk signals often emerge days or weeks before an event, across digital platforms, regional developments, protest mobilization networks and infrastructure ...
Onsite Event

Event Date: April 02, 2026
Hosted By: ̽»¨ÊÓÆµ
State, local and federal law enforcement agencies are facing increasing operational demands, tighter oversight and more complex digital environments. The 2026 Law Enforcement Innovation Summit brings together government and industry for a ...
WhoMeta-Microsite-Logo.png
WhoMeta Virtual Event

Event Date: April 02, 2026
Hosted By: WhoMeta & ̽»¨ÊÓÆµ
In an era where public trust, media narratives and online discourse can shape policy outcomes overnight, government leaders need more than dashboards and data feeds. They need clarity. Traditional media monitoring tools deliver volume, but rarely provide the strategic insight required to guide ...

Resources


Featured

In this episode of Identiholics, host Christine Owen is joined by Jamie Danker from Venable and Carole House from Terranet. They discuss the importance of women in the cybersecurity field and the need for more women to be involved in privacy and security discussions. The conversation highlights the ...

The discourse around secure mobile communication platforms has escalated in the United States public sector, where security and data integrity aren’t just priorities but mandates. As agencies become increasingly dependent on digital technologies to execute their missions, the need for secure p...

The Wiz + Accenture Responsive Protection System — a modern, unified cloud security platform tailored for federal agencies. A simple and secure way to enhance cloud security while reducing costs.

In the search for solutions to modernize legacy systems, federal agencies can consider integrations between Fortinet Federal and Garland Technology. Read highlights from the recent Better Together webinar with leading experts in IT and OT networks, Zero Trust architecture and federal ecosystems.

This article discusses the nature of how cybercriminals attack, from the inside! Cybercriminals use legitimate platforms to infiltrate your data. CyberFOX goes into detail on how you can stop these attacks from surfacing,

This article discusses how cyber- privileges affect access to educational institutions data. Phishing, Malware and Lack of Awareness can play a major factor in poor self-defense against cyber-attacks.

A new era of cyber threats has emerged with the rise of the “enterprising adversary,” as highlighted in the CrowdStrike 2025 Global Threat Report. This new breed of threat actor distinguishes itself through sophisticated and scalable tactics designed to execute attacks with calculated, b...

Druva provides a cloud-native, SaaS-based data protection and cyber resiliency solution that is FedRAMP authorized for US federal government agencies. We offer solutions for Microsoft 365 and endpoints, including features like accelerated ransomware recovery, eDiscovery, legal hold, and centralized ...

The U.S. Department of Defense recently clarified that the primary authentication factor for its networks is the PKI credential itself - not the physical Common Access Card (CAC) that stores it. This shift allows alternative secure hardware authenticators to store DoD-approved credentials, expanding...

View this article to understand how Cortex Cloud stops cyber-threats during their attack, stopping your data from being touched.