Back to Search Begin New Search Save Search Auto-Notify
Artificial Intelligence Operations-Enab...
Government agencies are always being asked to do more, with less budget and resources. By embracing Artificial Intelligence Operations (AIOps), agencies can get a holistic view of their enterprise and identify tactics to advance their mission. They can reduce costs, increase output, replace manual tasks with automation, and optimize the capacity of their workforce. When agencies deploy AIOps, what are the challenges that they face? What are th...
April 29, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Federal Insights Exchange Featuring GSA...
This session will discuss the Trusted Internet Connection (TIC) guidance updates to include the Remote User Use Case, alignment of the guidance with Zero Trust concepts, and the latest changes on GSA’s Enterprise Infrastructure Solutions to better supply TIC 3.0 solutions to agencies. Learning Objectives: Learn more about TIC 3.0 guidance, alignment with Zero Trust concepts Gain insights on recent changes on GSA’s EIS to better sup...
April 29, 2021
Organizer: ACT-IAC
Location: Webcast
Add Favorite
Increase Your Chance for Federal Grants...
Today’s siloed data center infrastructures are not capable of meeting the dynamic requirements of AI-driven research and development applications that simply do not care about the sales cycle for servers such as NVMe, NICs, GPUs, and other accelerator technologies. Liqid and NVIDIA eliminate data center silos to accelerate global academic research and development. Join Liqid and NVIDIA for a live webinar on composable disaggregated infra...
April 29, 2021
Organizer: Liqid Government Team at Carahsoft
Location: Webcast
Add Favorite
National Defense Authorization Act: Eas...
Section 889 of the 2019 National Defense Authorization Act prohibits the federal government, government contractors, and grant and loan recipients from procuring or using “covered equipment or services” that are produced by Huawei, ZTE, Hytera, Hikvision, and Dahua. In addition to the expected due diligence around third-party suppliers, buyers are required to rapidly report any covered equipment or services discovered during contra...
April 29, 2021
Organizer: Digital Government Institute
Location: Webcast
Add Favorite
Software Factories: Delivering Secure S...
The creation of assembly line manufacturing powered progress in the 20th century. Today that concept is being applied to software development – software factories that give programmers the tools to iteratively build, test and deploy code and applications every day. This concept is being used throughout the federal government, especially within the Department of Defense. The U.S. Air Force has a number of such factories, all working on a...
April 29, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Building GitLab Pipelines on OpenShift
Standardize application lifecycles and automate routine operational tasks to speed software deployments at scale. DevSecOps methodologies can improve the engineering processes regardless of the environment in which applications and services are run.Join industry experts on April 29th to learn how Red Hat and GitLab can better support your journey to DevSecOps and cloud native application development and:Explore how to successfully implement th...
April 29, 2021
Organizer: Red Hat Government Team at Carahsoft
Location: Webcast
Add Favorite
Evolving Your Posture for Emerging Rans...
According to Gartner, 90 percent of ransomware attacks can be prevented. Don't be part of the 10 percent - learn how hackers are defeating your ransomware tools. Join Trustwave Government Solutions on Thursday, April 29th, and hear from Grayson Lenik as he speaks on the following:Evolution of ransomwareRed Team simulation against ransomware toolsCase study of a recent ransomware attackDon't miss out - register today!
April 29, 2021
Organizer: Trustwave Government Team at Carahsoft
Location: Webcast
Add Favorite
CMMC Trailblazer Series: Cybersecurity...
Organizations seeking a CMMC Maturity Level greater than 1 are expected to implement incident response processes and practices that demonstrate their ability to detect, report, analyze, and triage cyber incidents. In this webinar, DHG is excited to welcome Paul Ihme of cybersecurity firm Soteria LLC to discuss how to establish and execute a robust Cyber Security Incident Response Plan to meet CMMC requirements, including integration with Manag...
April 29, 2021
Organizer: Dixon Hughes Goodman
Location: Webcast
Add Favorite
Preparing for a Successful CPSR Audit P...
This course focuses more in-depth on regulatory guidelines and the practical aspects of how to best prepare for (and pass!) a CPSR audit. Your company has become a successful government contractor and business is growing! You’re winning higher dollar, flexibly priced contracts and the future is bright! But then you receive a risk assessment form from your Contracting Officer asking for information that’s needed to determine if you...
April 28-29, 2021
Organizer: Centre Law and Consulting
Location: Webcast
Add Favorite
2021 Tax Technology Seminar
The past year has highlighted the importance of a nimble tax function that, whether remote or in person, can operate seamlessly with tight controls, streamlined data integrity, and collaborate and communicate effectively, unhindered by physical location. TEI’s third annual tax technology seminar, taking place April 27-29, 2021, will directly address this pressing need. The 2021 Virtual Tax Technology Seminar will survey the strategy, tre...
April 27-29, 2021
Organizer: Tax Executives Institute (TEI)
Location: Virtual
Add Favorite
Back to Search Begin New Search