Back to Search Begin New Search Save Search Auto-Notify
Computers For Learning (CFL) In PPMS.gov
Come learn about the Computers For Learning module in PPMS.gov including CFL Allocations, CFL Requisitions, CFL Completed Transfers, CFL eligibility best practices and more. Federal Agencies can learn about how they can donate computer equipment to schools through the CFL program, and what to expect throughout the process. There is no charge for this class and you’ll earn One Continuous Learning Point by completing this hour-long virtual...
June 20, 2024
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
AI & ML in Records Management
Artificial Intelligence (AI) and Machine Learning (ML) are rapidly changing the way records managers track the data they have, from where it is located to who can access it to what information it contains. These technologies are also changing how agencies meet compliance requirements. In this virtual workshop, we break down these concepts and show the potential benefits to your agency. You will leave with a better understanding of how AI/ML ca...
June 20, 2024
Organizer: Digital Government Institute
Location: Virtual
Add Favorite
From Legacy to Leading Edge: Embracing...
As organizations pivot towards digital-first strategies, the imperative to adopt scalable and flexible identity frameworks has never been more critical. In an increasingly interconnected world, it is crucial for organizations to build a resilient identity architecture that not only supports current needs but anticipates future demands. Join CyberArk and UberEther on June 20th to explore the transformative journey from traditional, on-premises...
June 20, 2024
Organizer: CyberArk Government Team at Carahsoft
Location: Webcast
Add Favorite
AI and State-Sponsored Espionage - A We...
Join Google Cloud, Mandiant, and GuidePoint Security for panel discussions focused on the dangers of state-sponsored cyber espionage and how Artificial Intelligence (AI) is rapidly changing the world and, with it, the landscape of cyber threats. AI is being utilized by both attackers and defenders, with the adversarial use of AI posing a growing concern. Recent trends indicate that cyber espionage is on the rise, and the employment of AI by th...
June 20, 2024
Organizer: Google Cloud Government Team at Carahsoft
Location: Webcast
Add Favorite
Automation as a Cybersecurity Resource
Government agencies at all levels face cyber threats at an increasing rate. Ransomware attacks alone increased by 70% year over year in 2023. Yet agencies are constrained by budget limitations and the shortage of cybersecurity professionals, leading to trying to manage from crisis to crisis and never catching up. Automating security workflows can help agencies get a handle on their challenges and prioritize their security needs, but it isn...
June 20, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Procurement Integrity - Analytics to Re...
SAS' solutions introduce an approach to layer an analytic system on top of your existing systems, creating a continuous monitoring solution. In their upcoming webinar, subject matter experts will highlight real world examples, showing how other government entities improved their procurement and accounts payable processes by integrating with SAP, Oracle and other ERP systems. Join SAS' webinar, where you can also expect to learn more about: Ris...
June 20, 2024
Organizer: SAS Government Team at Carahsoft
Location: Webcast
Add Favorite
Achieving Cybersecurity Resilience in S...
New Mexico recently issued Executive Order 2024-011, a comprehensive state-wide security assessment to identify vulnerabilities in cybersecurity and necessitates that all state agencies adopt the National Institute of Standards and Technology (NIST) standards for cybersecurity by November 1, 2024. Register now to hear how Synopsys can help you navigate the requirements of EO 2024-011 and secure your critical applications. Join Synopsys on Jun...
June 20, 2024
Organizer: Synopsys Government Team at Carahsoft
Location: Webcast
Add Favorite
How to Hunt for Volt Typhoon Malware in...
The federal government has strenuously and repeatedly stated that critical infrastructure providers must be proactive in hunting for malware that may be present in networks, focusing specifically on CCP-sponsored Volt Typhoon Adversary. Join critical infrastructure experts for a panel discussion on how to hunt for Volt Typhoon. Discussion topics will include: How Four18 Intelligence uses UnknownCyber ThreatHunter to hunt for Volt Typhoon and...
June 20, 2024
Organizer: UnknownCyber Government Team at Carahsoft
Location: Webcast
Add Favorite
Combatting Emerging Threats: Proofpoint...
Proofpoint, BluVector and Carahsoft are excited to invite you to join us in the lead up to TechNet 2024 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. The digital evolution is moving quick, and it’s easy to be overwhelmed and click (or scan) something you shouldn’t have. Join us for an exclusive webinar where experts from Proofpoint and BluVector wi...
June 20, 2024
Organizer: Proofpoint Government Team at Carahsoft
Location: Webcast
Add Favorite
Leveraging NASPO for Continuous Situati...
Lead time is critical when responding to public safety emergencies. Decision-makers need clarity and context as an event unfolds to effectively manage their operations to bolster first response, transportation, infrastructure protection and emergency management. Artificial intelligence can help deliver reliable, relevant, real-time information for public sector organizations to protect the people and communities they serve by providing them wi...
June 20, 2024
Organizer: Dataminr Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search