Back to Search Begin New Search Save Search Auto-Notify
How to Buy Cloud Computing for Government
This webinar shares how agencies can procure cloud computing. You’ll learn about the advantages of cloud computing, and how to use GSA’s contracts to make the cloud acquisition process easier and more efficient. There’s no charge for this event! Join us to: Get valuable information about cloud computing and its benefits to government Gain an overview of how GSA helps agencies with cloud acquisition Learn everything you need t...
January 31, 2024
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Navigating the Complex Landscape of Mod...
The cat-and-mouse game between threat actors and cybersecurity professionals continued unabated in 2023, with new threats designed to avoid detection. Many of these threats are new takes on old ones, such as “leveling up” invoice fraud. And ransomware attacks are evolving; rather than encrypting victims’ data, they are straightforwardly stealing the information and extorting payment by threatening to post the info online or t...
January 31, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Making AI Work for Us - Improving Acqui...
DESCRIPTION: Generative Artificial Intelligence and Emerging Technologies have entered the government procurement environment and from everyone’s perspective these technologies are here to stay. These newer technologies enable us to re-imagine service delivery and provide more efficient operations; however, there are still concerns about ethical and legal implications, intellectual property rights, data and privacy protection, and more....
January 31, 2024
Organizer: ACT-IAC
Location: Reston, VA
Add Favorite
Secure Schools, Bright Futures: Cyberse...
K-12 institutions are focused on providing continuous, safe, and secure learning environments for students and staff. Despite being resource constrained, school districts must adhere to fundamental cybersecurity practices such as FERPA compliance and ransomware prevention. Join us to learn about the top cybersecurity best practices for K-12 school districts and how Palo Alto Networks approaches these in order to safeguard people and data. In...
January 31, 2024
Organizer: Palo Alto Networks Government Team at Carahsoft
Location: Webcast
Add Favorite
Making Digital Services More Accessible
Digital services have the power to transform how people interact with government agencies. For example, instead of waiting in an hour-long line to update your driver’s license you could renew online. However, for digital services to be truly revolutionary they must be accessible to everyone. Accessibility can take many forms; it can mean providing tools to aid those with disabilities, using inclusive language to not alienate populations...
January 31, 2024
Organizer: GovLoop
Location: Webcast
Add Favorite
AFFIRM Uplift: Annual Women in IT Spotl...
Kick off 2024 with AFFIRM and our interactive, virtual panel of accomplished IT executives from a variety of agencies and backgrounds. It is important for all of us in the government IT industry to nurture emerging and proven talent. Our panel of outstanding women leaders will share their insights about their own mentors, what it takes to rise through the ranks of an agency, and how they define professional and personal success. Join us to hea...
January 31, 2024
Organizer: AFFIRM
Location: Webcast
Add Favorite
Insider Threat Program Development - Ma...
PART 1 of this highly sought after and very comprehensive 2 day training course, will ensure that the ITP Manager and others who support the ITP (Insider Threat Analyst, FSO, CSO, CISO, Human Resources, CIO - IT, Network Security, Counterintelligence Investigators, Mental Health / Behavioral Science Professionals, Legal Etc.), have the Core Knowledge, Blueprint, Resources needed for developing, managing, enhancing an ITP / ITP Working Group. T...
January 30-31, 2024
Organizer: Insider Threat Defense Group
Location: Laurel, MD
Add Favorite
Overcoming Stolen Identities: Enabling...
Adversaries increasingly leverage stolen identities to escalate privileges and steal data in the cloud. Over 80% of hacking breaches involved credentials, whether lost or stolen, to impersonate users for further compromise. Join us as we delve into implementing the DoD’s groundbreaking Zero Trust Strategy. This session will explore how the DoD's Zero Trust Strategy strategically integrates identity protection and endpoint detection withi...
January 30, 2024
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Networking With Purpose: How to Build L...
In a hybrid work environment, figuring out how to network and build relationships is hard. However, it’s not impossible. And it is imperative for your career growth to cultivate strong relationships with your mentors, supervisors and peers. Join GovLoop and NextGen online Tuesday, Jan. 30, from 2-2:50 p.m. ET/11-11:50 a.m. PT to learn from a government networking expert about how to build relationships that matter in today’s work e...
January 30, 2024
Organizer: GovLoop
Location: Webcast
Add Favorite
SANS Cyber Security Mountain: January 2...
Learn to combat the world’s latest cyber threats with up-to-the-minute training from real-world practitioners! Make new connections at one of the largest gatherings of professionals in the cyber community this year. Join us Live Online for SANS Cyber Security Mountain: January 2024 - Live Online (Jan 22 – 27). SANS Cyber Security Mountain: January 2024 - Live Online: In-Person or Live Online training Tactical cyber security t...
January 22-27, 2024
Organizer: SANS Institute
Location: Virtual
Add Favorite
Back to Search Begin New Search