̽»¨ÊÓÆµ

̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Events and Resources

Events

Upcoming Events

Logo__Wordmark_-_Blue80px.png
Snowflake Virtual Event

Event Date: March 05, 2026 - April 30, 2026
Hosted By: Snowflake & ̽»¨ÊÓÆµ
New York’s state and local Governments managed some of the nation’s most complex public services—from housing and public health to education, transportation and public safety. Yet data remained fragmented across agencies, systems and jurisdictions, slowing progress on mission-critical initiatives. This ...
OpenTeams-Microsite-Logo.png
OpenTeams Virtual Event

Event Date: March 26, 2026 - August 27, 2026
Hosted By: OpenTeams & ̽»¨ÊÓÆµ
With Federal agencies now deploying AI systems under active Executive Orders and policy mandates, teams responsible for delivery and oversight face increasing execution and governance risk.
Claroty-Microsite-Logo.png
Claroty Virtual Event

Event Date: April 30, 2026
Hosted By: Claroty & ̽»¨ÊÓÆµ
CPE credit available
Transportation has long prioritized safety of people and goods. Today, modernization requires leaders to account not only for safety risk, but for cyber-operational risk and its cascading impact on mission ...
Google-Public-Sector-Microsite-Logo.png
Google Virtual Event

Event Date: April 30, 2026
Hosted By: Google Public Sector & ̽»¨ÊÓÆµ
CPE credit available
As of March 2026, the cyber landscape has shifted from regional tension to a state of kinetic-cyber convergence following the outbreak of war with Iran. Public sector Security Operations Centers (SOCs) are now on the front lines, facing a surge of over 60 coordinated hacktivist groups and ...
SentinelOne_Logo_Tagline_RGB_2c_PURP_BLK_200x80.png
SentinelOne Virtual Event

Event Date: April 30, 2026
Hosted By: SentinelOne & ̽»¨ÊÓÆµ
CPE credit available
The ThreatOps Challenge is a capture the flag style webinar where attendees will put their cybersecurity expertise to the test against peers, competing for points, recognition and the title of ThreatOps ...
databricks-microsite.png
Databricks Virtual Event

Event Date: April 30, 2026
Hosted By: Databricks & ̽»¨ÊÓÆµ
CPE credit available
Managing institutional technology today shouldn’t feel like reacting to an endless stream of new tools without a clear strategy. As AI and emerging technologies accelerate, higher ed leaders need a structured approach to evaluate investments, reduce redundancy and align technology to ...
Chainguard-New-Logo.png
Multi-Vendor Onsite Event

Event Date: April 30, 2026
Hosted By: Chainguard, GitLab, Epoch Concepts & ̽»¨ÊÓÆµ
CPE credit available
Location: Huntsville, AL
Many organizations believe accelerating software delivery means accepting more risk. This lunch and learn proves otherwise.   Join GitLab, Chainguard and Epoch Concepts for a live demonstration of how to embed security directly into your software development lifecycle - without slowing down ...
Dynatrace-Microsite-Logo.png
Multi-Vendor Virtual Event

Event Date: April 30, 2026
Hosted By: Dynatrace, Red Hat & ̽»¨ÊÓÆµ
CPE credit available
Artificial intelligence (AI)-enabled software automation significantly enhances the operations and management of critical systems essential to mission delivery, regulatory compliance and data-driven decision-making across the Federal Government. Join us for a one-hour deep dive into how Red Hat and Dynatrace ...
Ping-Identity-New-Logo.png
Ping Identity Virtual Event

Event Date: April 30, 2026
Hosted By: Ping Identity & ̽»¨ÊÓÆµ
CPE credit available
Join us for an insightful event focused on how federal agencies can operationalize Zero Trust by transforming privileged access into a controlled, auditable, mission-aligned capability, with expert insights from Ping ...
Thales_LOGO_.png
Thales Trusted Cyber Technologies (TCT) Virtual Event

Event Date: April 30, 2026
Hosted By: Thales TCT & ̽»¨ÊÓÆµ
CPE credit available
Federal agencies must now start the transition to quantum-safe cryptography. Driven by National Security Memoranda, executive orders and Federal mandates, agencies must move away from legacy cryptographic systems and adopt NIST-approved post-quantum cryptography (PQC) algorithms to protect sensitive data against ...

Resources