Modernizing Government's Distributed Wo...
Governments everywhere and at all levels should be applauded for finding ways to meet their citizens’ needs during the pandemic. While many agencies had continuity-of-operations plans in place, no one imagined that every agency would have to act on them at the same time. What made it possible, of course, was the rapid spread of cloud-based technology that enabled government employees to work from their own homes, frequently using their o...
Additive Manufacturing: The Next Genera...
The U.S. military maintains bases in more than 70 countries and territories around the world, some of them in inhospitable or hard-to-reach areas. When a piece of equipment fails – whether a weapon, a radar dish, or something more prosaic like a mess hall stove – getting replacement parts can be difficult and time-consuming, and the delay can cause anything from mild inconvenience to serious problems meeting the mission. Larger bas...
Scaling Digital Defenses: The Building...
Government agencies continue to expand their digital service offerings, making it easier than ever before for the public to access critical benefits and services online. However, this rapid expansion of digital services has opened the door to unprecedented identity fraud and abuse, costing billions of dollars. In many cases, additional customer friction was introduced for identity verification processes as a mechanism for reducing fraud. But t...
2022 - FAR Supplement - DIAR - Interior
FAR Agency & Department Supplement - Webinar Series Complimentary & Recorded Find recordings on our website and YouTube Channel Sponsorships available at hello@jenniferschaus.com
The Role of Digital Technology in Succe...
The Infrastructure Investment and Jobs Act, signed into law in November 2021, will unleash a flood of funding for a vast array of construction projects, including electric grid and energy improvements, roads and bridges, public transit, and water systems to name just a few. It is worth celebrating that so much will be repaired, replaced, or new-built. It also highlights a new opportunity to bring digitization to the construction industry, brin...
Corporate Web-based Export, Import, and...
Corporate Web-based Export, Import, and Sanctions Training on your LMS or Ours Choose the content that you need from CE’s expansive library, personalize it for your organization, configure to fit the varying training needs of your learners, and deploy throughout your global organization with state-of-the-art tracking and assessment tools. Over 120 training modules in the categories of: EXPORT COMPLIANCE IMPORT & CUSTOMS SANCTIONS COM...
Navigating the Horizons of Aerospace an...
This webinar will explore the benefits and challenges of manual software testing versus automated software testing in the defense and aerospace industries. Participants will gain a comprehensive understanding of the differences between these two testing approaches, including their respective advantages and limitations. We will discuss the role of manual testing in ensuring the safety and reliability of critical defense and aerospace systems, a...
User Centered Digital Experience Series...
8 Barriers of Digital Service Adoption Positive government agency service adoptions are becoming increasingly important as government agencies focus on creating seamless customer experiences (CX). Reducing barriers to digital service adoption and ensuring more users successfully switch requires government agencies to provide intuitive digital experiences that thoughtfully guides individuals through the process. In this session, experts will ex...
Navigating the Zero Trust Maze
The federal government’s emphasis on cybersecurity for all agencies has had a dizzying effect on the regulatory environment. Agencies must address Executive Order 14028, mandating a zero trust architecture by September 2024. To get there, they must navigate through the General Services Administration’s approved cloud offerings in the Federal Risk And Management Program (FedRAMP). Then there are the National Institute of Standards a...
Cyber Resilience 2023 - Two Day Virtual...
Ever since the dawn of the internet, its usefulness lies in the data it handles, whether moving it, storing it, or calculating with it. As a result, just as Willie Horton once said he robbed banks because “that’s where the money is,” many of today’s cyber bad actors target agencies’ data because they can monetize it. As a result, cybersecurity is akin to the 20th century Cold War. On the one hand, bad actors ...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.