CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
CGRC | Official ISC2 Training Week
CGRC | Official ISC2 Training Week 40 CPE’s Official ISC2 CGRC certification provides a comprehensive review of the knowledge required to effectively gain the expert knowledge, skills, and experience to manage risk and authorize and maintain information systems within various frameworks. Participants receive the following with registration: Official ISC2 CGRC Student Training Guide (eBook) 180-Day Access to Class Recordings Applied Scena...
FSSI OS4 Fourth Generation
The Federal Strategic Sourcing Initiative for Office Supplies Fourth Generation (FSSI OS4) solution provides customers with the ability to cut costs and increase efficiencies by buying everyday supplies such as pens, paper, and printing items from a list of vendors with negotiated low prices. Attend this webinar to:Get detailed information on how to order supplies through the FSSI OS4 purchasing channelSee a walk-through with GSA Advantage!ŽEa...
OASIS+ DPA Training
OASIS+ Delegation of Procurement Authority (DPA) Training gives procurement staff access to the new OASIS+ contracts and teaches best practices for task order issuance. The DPA clearly delineates the roles and responsibilities between the GSA contracting officer and the ordering contracting officer and complies with the Office of Management and Budget's executive agent designation to GSA. Warranted OCOs (a contracting officer appointed pursuan...
CyberThreats 2024: Combatting the Evolv...
The means and methods of launching cyber attacks against government agencies and critical infrastructure industries at all levels continue to proliferate rapidly. From cyber attacks on water and wastewater treatment systems to ransomware targeting hospitals and physicians’ practices, phishing attacks to straightforward fraud, state and local agencies, educational institutions, and tribal and territorial governments often find themselves...
December 19, 2024
Organizer:
FedInsider Location:
Webcast
FY25 Managing the Disposal of Personal...
GSA Personal Property Management is hosting a FREE virtual Managing Property in PPMS. Registration is required for this training - each participant will get their own unique entry URL, so you must register to be granted access to ZOOM Government. Participants will receive one (1) Continuous Learning Point for attending. GSA Zoom Government may not be compatible with everyone's system. Please test your connection. For questions, please contact...
FY25 Abandonment & Destruction
FREE training on the Federal Personal Property Management Abandonment and Destruction process. Registration is required for this training - each participant will get their own unique entry URL, so you must register to be granted access to Zoom Government. Participants will receive one (1) Continuous Learning Point for attending. GSA Zoom Government may not be compatible with everyone's system. Please test your connection early. For questions,...
Using the Yellow Book for the Governmen...
Enhance Your Government Auditing Skills with the Yellow Book Are you a government auditor looking to enhance your skills and stay up-to-date with the latest industry standards? Look no further than our comprehensive training event designed specifically for government auditors like you. In this training, we aim to provide you with the knowledge and skills necessary to effectively utilize the Yellow Book, also known as Government Auditing Stand...
ATARC's Public Sector Summit
In the realm of government modernization, the United States grapples with the intricate task of updating its legacy systems to align with the rapid pace of technological advancement. This event unpacks the multifaceted challenges inherent in this endeavor, spotlighting the delicate equilibrium between fostering innovation and adhering to budgetary and regulatory confines. At its core, the discussion revolves around legacy systems migration...
December 18, 2024
Organizer:
ATARC Location:
Reston, VA
CyberThreats 2024: Combatting The Evolv...
The means and methods of launching cyber attacks against government agencies and critical infrastructure industries at all levels continue to proliferate rapidly. The U.S. government is responsible for attending to our national interests, from federal safety nets such as environmental protection and Social Security to national defense and protection against hostile foreign actors, whether individuals, terrorist groups or nation-states. Hundred...
December 18, 2024
Organizer:
FedInsider Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.