Back to Search Begin New Search Save Search Auto-Notify
How to Defend Your Expanding Attack Surface
There are plenty of benefits to innovative new technologies, from greater efficiency to cost savings to customer satisfaction. It is rare, however, for a new technology to truly replace existing IT – rather, it gets incorporated into or bolted onto current systems. This approach, along with the explosion of mobile devices and proliferation of software and SaaS applications, dramatically increases and clouds an Agency’s cyber footpr...
June 18, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Personal Property Abandonment & Destruction
Come learn about the Abandonment & Destruction of Personal Property directly from Federal Management Regulation (FMR) 102.36. This training will provide you with information as to what kind of property you can consider for abandonment and destruction, what are the rules, under what conditions, and when you should consider taking such action. You will also learn the two questions that you may ask prior to considering this task. This class p...
June 18, 2024
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
VETS 2 DPA Training
Who Should Attend: All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how the VETS 2 GWAC can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against the VETS 2 GW...
June 18, 2024
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Decoding Digitalization Defense: Friend...
The adoption and implementation of digitalisation is well underway in most of society, with defence organisations at various stages of the transition. However, are any of them losing out due to the speed of adoption? Given the “new normal” in warfare we are witnessing in Ukraine, what is their plan to create and maintain information superiority without digitalisation? Defence agencies’ traditional working practices are battle...
June 18, 2024
Organizer: AFCEA Pocono | AFCEA Europe
Location: Webcast
Add Favorite
Anchore VIPERR Workshop
Developing concrete processes and controls to secure your organization's software supply chain can absorb massive amounts of time and resources without guaranteeing significant security improvements. Enter VIPERR, an actionable software supply chain security framework developed by Anchore, synthesizing lessons learned from supporting the most challenging software supply chains across government agencies and the defense industrial base. Join An...
June 17, 2024
Organizer: Anchore Government Team at Carahsoft
Location: Reston, VA
Add Favorite
SANS Miami 2024
Hands-On Cyber Security Training in Miami Celebrating 35 Years of Cybersecurity Excellence Dive into an immersive cyber security training experience at SANS Miami 2024 (June 3-15, ET). Led by world-renowned instructors boasting extensive industry experience, SANS Miami 2024 offers live access to top experts in the field. SANS Miami 2024 is equipped with industry-leading hands-on labs, simulations, and exercises that you can immediately apply u...
June 3-15, 2024
Organizer: SANS Institute
Location: Coral Gables, FL
Add Favorite
Cloud Governance, Risk and Compliance T...
Cloud GRC Training In today’s rapidly evolving digital landscape, managing governance, risk, and compliance (GRC) in the cloud is more critical than ever. Intrinsec’s 2 day Cloud GRC Training Course is designed to equip IT professionals, security specialists, and compliance officers with the knowledge and skills needed to navigate the complexities of cloud governance and compliance frameworks effectively> Created in response to...
June 13-14, 2024
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
June 10-14, 2024
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
FAR/DFARS Mid-Year Update 2024
This presentation provides an update on the latest and greatest changes to the Federal Acquisition Regulation (FAR), Defense Federal Acquisition Regulation Supplement (DFARS), and other regulations. | Live Virtual Training | Intermediate | 90 minutes | 1.5 CPE/CLP | $55 member/$69 non-member | Included in the Virtual Training Subscription Description: Join this session an update on the latest and greatest changes to the Federal Acquisition Re...
June 13, 2024
Organizer: National Contract Management Association (NCMA)
Location: Webcast
Add Favorite
ATARC's Federal DevSecOps Summit
Embark on a federal-focused exploration of the convergence between high-level software and open-source principles in this illuminating panel discussion. From Python to React, high-level software drives innovation within government agencies, while open-source collaboration empowers federal entities to deliver impactful solutions efficiently. Join us as we unravel the unique dynamics at play within government spheres, examining how high-level so...
June 13, 2024
Organizer: ATARC
Location: Reston, VA
Add Favorite
Back to Search Begin New Search