̽»¨ÊÓÆµ

̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Archived Events

liveaction-bluecat-logo-dark-microsite.png
Multi-Vendor Virtual Event

Event Date: April 16, 2024
Hosted By: LiveAction, Gigamon & ̽»¨ÊÓÆµ
In this webinar, attendees learned: How to meet Network, Orchestration/Automation and Visibility/Analytics requirements  How to manage encrypted data   The importance of Lateral or East-West visibility in Zero Trust
liveaction-bluecat-logo-dark-microsite.png
LiveAction Virtual Event

Event Date: June 22, 2023
Hosted By: LiveAction & ̽»¨ÊÓÆµ
During this LiveAction and ̽»¨ÊÓÆµ webinar, federal mandates for cybersecurity, including OMB M-21-31 and Zero Trust, were addressed. We found that many organizations are just beginning their discovery for maintaining OMB M-21-31 compliance. In this webinar, we showed you how LiveAction network performance management ...
liveaction-bluecat-logo-dark-microsite.png
Multi-Vendor Virtual Event

Event Date: March 21, 2023
Hosted By: LiveAction, Gigamon & ̽»¨ÊÓÆµ
̽»¨ÊÓÆµ invited LiveAction CTO and Founder John Smith, and Gigamon Senior Sales Engineer Matt Hollingsworth, for a joint webinar on March 21st at 2pm EST where attendees learned: White House Executive Order and Memorandums on Zero Trust and OMB M-21-31 Definition of Zero Trust and its ...
liveaction-bluecat-logo-dark-microsite.png
LiveAction Virtual Event

Event Date: February 09, 2023
Hosted By: LiveAction & ̽»¨ÊÓÆµ
 Attendees joined ̽»¨ÊÓÆµ and LiveAction's CTO & Founder, John Smith, and learned:  Overview of OMB M-21-31 and the requirements across four Event Logging tiers and mandates adherence guidelines.  Specific requirements for Level 2 deadline on February ...

Resources


Cybersecurity Buyer's Guide for Government
Guide

Cybersecurity Buyer's Guide for Government

Read this guide to explore ̽»¨ÊÓÆµ's extensive portfolio of cybersecurity solutions designed to protect government infrastructures, networks and assets. Discover which cybersecurity vendors best align with your organization's goals in Cloud Security, Supply Chain Risk Management, Identity & Access Management and more.