Back to Search Begin New Search Save Search Auto-Notify
ArcGIS Pro Geospatial Environment with...
ArcGIS is the world's leading Geographic Information System (GIS) software and analytics platform from Esri. Join us to learn how desktop virtualization for ArcGIS Pro with Microsoft's Azure Virtual Desktop can significantly improve performance, maintainability, and reduce costs of your GIS environment.During this webinar, we will cover topics including:The benefits of software virtualization in the cloudHow Azure Virtual Desktop has been used...
December 7, 2022
Organizer: Microsoft Government Team at Carahsoft
Location: Webcast
Add Favorite
Implementing a Zero Trust Architecture...
Agency zero trust policies and strategies are in place. Now it’s all about implementation and defining success. During this exclusive webinar, moderator Jason Miller will discuss zero trust in 2023 and beyond with agency and industry leaders. Learning objectives: Current state of zero trust The pillars of zero trust Measuring success of zero trust strategy
December 7, 2022
Organizer: Federal News Network
Location: Webcast
Add Favorite
December UiPath & Alpha Omega Integrati...
In this session, attendees will learn about: A multi-disciplinary pragmatic approach required to reduce the time it takes to complete a system going through ATO, or for re-certifying a system Alpha Omega Integration, A2O™ solution built in collaboration with the industry-leading automation vendor UiPath How A2O™ automates The discovery of ATO processes and tasks The collection of data from manual controls Executing controls ...
December 6, 2022
Organizer: UiPath Government Team at Carahsoft
Location: Webcast
Add Favorite
Protecting Your Identity Attack Surface
94% of organizations have experienced an identity-related breach, making real-time identity threat detection and response a critical strategy for security teams.Regardless of if your users connect from a PC, Mac, or Chromebook (the primary identity store for most schools), Active Directory (AD) represents an especially attractive and vulnerable target for adversaries.Join SentinelOne as we cover:Real-time vulnerability assessment around identi...
December 6, 2022
Organizer: SentinelOne Government Team at Carahsoft
Location: Webcast
Add Favorite
Vision 2023: How Digital Transformation...
The state of Texas wants to accelerate the use of next-generation technology to deliver secure digital services. To that end, it has released its 2022-2026 State Strategic Plan for Information Resources Management, which sets four overarching goals: Secure IT service delivery Advanced data management Strategic digital transformation Proactive approach to emerging technologies Just as Texas agencies are looking to modernize and transform their...
December 6, 2022
Organizer: FEDINSIDER
Location: Austin, TX
Add Favorite
Classified Mobility Solutions: Streamli...
Federal defense and civilian organizations responsible for communications acknowledge the critical need to improve mobility and remote work solutions for classified workers. Now, turnkey enterprise-class network solutions combined with industry-leading secure software are delivering the benefits of classified access to warfighters and remote and mobile workers in the field. These systems allow end users to use commercial mobile devices to acce...
December 6, 2022
Organizer: AFCEA | Signal Webinar
Location: Webcast
Add Favorite
FCL-GSA-0023 Basic Contracting for GSA...
Target Audience: Federal Agency and Military This comprehensive training course covers Federal Supply Schedules contracting and ordering procedures. It addresses placing orders against Multiple Award Schedules, as outlined in Federal Acquisition Regulation (FAR) Subpart 8.4. In this course you will learn about the unique flexibility within the GSA Schedules program. This is a four (4) CLP credit course. Note: This webinar satisfies the FAC-C L...
December 6, 2022
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
New Year, New Threats: What You Need to...
In this webinar, Joey Fitzpatrick, Lead Threat Analysis at IronNet, will share tips and tools to prevent impacts to mission-critical functions by blocking threats before a cyber-attack. As you prepare for 2023, do you have a comprehensive attack surface management plan to proactively stop cyber threats? Learn best practices to strengthen your cybersecurity posture and how IronNet's elite threat hunters can help you prepare.
December 6, 2022
Organizer: IronNet Government Team at Carahsoft
Location: Webcast
Add Favorite
Enabling Next Generation Military Techn...
What does the basic set up of ICAM look like in defense agencies and how do they maintain that security and expansion as they move forward? During part 1 of this exclusive webinar series, moderator Tom Temin will discuss ICAM with agency and industry leaders. Stay tuned for parts 2 and 3 of this series where Tom and his guests will discuss mission partner environment networking and 5G. Learning objectives: Current state of ICAM Use of ICAM as...
December 6, 2022
Organizer: Federal News Network
Location: Webcast
Add Favorite
Effective Use of the COSO Framework (16 CPEs)
4, ba Our approach for this in-person training event is to provide the relevant information which internal control professionals will need to fulfill the "Internal Control Life Cycle" using the "top-down, risk-based" approach. We provide the background knowledge sources, advice on how to conduct risk assessments, discuss scoping, and review how to plan the assessment of an internal control framework based on COSO. Risk management activities ar...
December 1-2, 2022
Organizer: Corporate Compliance Seminars
Location: Dulles, VA
Add Favorite
Back to Search Begin New Search