October 2024 Procurement Division Meeting
Join the NDIA Procurement Division on October 8th for their quarterly meeting which will feature speakers and panelists addressing current defense industrial base issues and today's challenges facing the acquisition and procurement community. These meetings also provide an opportunity for the divisions' committees to conduct business specific to its members. Committees include: Contract and Acquisition Management and Legal Committee and Contra...
Tax Planning with Ed Zurndorfer
An Overview of How Federal Benefits are TaxedFERS AnnuityCSRS AnnuityTSP Withdrawals from both Traditional and Roth TSP accountsSurvivor BenefitsEd reviews how the IRS treats each of these items for Federal Employees. Other Tax Planning Topics to ConsiderThe taxation of Social Security Benefits, how much the state you live in impacts your net amount of income, and which states have the highest and lowest property tax rates The 2017 Tax LawHow...
AI Governance: Ensuring Responsible AI...
The recent Executive Order on Artificial Intelligence has established a new standard for the safe, secure, and trustworthy deployment of AI technologies. In response, federal institutions must implement robust governance frameworks to mitigate risks, safeguard privacy, and foster equity. However, the AI landscape is continuously and rapidly evolving, and agencies are encountering complex hurdles that make adopting a trusted AI platform a chall...
Preparing for Your Crypto Future: Marke...
From the Pentagon to boots-on-ground, cloud computing is driving actionable, data driven decisions that keep our nation safe. Effective data analytics require edge to cloud data collection as well as cloud to edge data dissemination. The secure transport of this data over disparate networks is driving interdependencies between data links over secure Layer 3 using High Assurance IP Encryption (HAIPE) and secure Layer 2 using Ethernet Data Encry...
Securing the Future: Protecting State a...
State and local governments are increasingly embracing technology to modernize how they plan, build and manage critical infrastructure. While digital transformation brings efficiencies, it also introduces new cybersecurity risks. Outages, breaches and cyberattacks can disrupt projects, lead to financial losses and damage public trust. Join Government Technology, GuideHouse, and Kahua on Oct. 8, 2024, at 11 AM PT/ 2 PM ET for a live webinar on...
Anatomy of a Ransomware Attack: Protect...
Ransomware attacks are becoming alarmingly frequent and sophisticated. They pose severe risks to healthcare providers by compromising patient data, disrupting critical services, and imposing substantial financial burdens. According to data from the Zscaler ThreatLabz 2024 Ransomware Report, healthcare was a prime target of ransomware attacks throughout 2023 and into 2024, seeing a 126% increase year-over-year in the number of attacks. Understa...
South-East CMMC (SEC) Conference
The Cybersecurity Maturity Model Certification (CMMC) first began its journey back in 2019. After long delays, lack of formal communications by the U.S. Government, and overall fatigue by industry on the topic of CMMC, many businesses remain unready to meet contractual obligations as defined by the FAR and DFARS. As of August 2024, the CMMC rule has now been fully vetted by the U.S. Government and is slated for adoption in CFR 32 and 48 this O...
Using the Tableau Catalog + Lineage
Embark on a data discovery expedition with Tableau Catalog and Lineage! Join us as we dive into the data lineage behind the dashboards, navigating through the flows, data sources, and relationships. Learn how to harness the power of Tableau's robust cataloging capabilities to unlock insights and streamline your analytics journey. During this webinar, attendees will:Explore how Tableau Catalog provides a comprehensive view of data lineage, trac...
Fortifying the Future: Data Security Po...
Forcepoint and Carahsoft invite you to join our Fortifying the Future: Data Security Posture Management webinar, which focuses exclusively on DSPM for federal agencies. Discover how to protect information critical to our nation's security, leveraging AI to quickly and accurately provide control and accountability for Federal Government Security Officers. Ongoing digital transformation projects at federal agencies have delivered a host of new s...
Introduction to Post Quantum Encryption...
Advances in quantum computing technology have made traditional encryption methods ineffective, putting critical digital information at risk. The Cybersecurity and Infrastructure Security Agency (CISA) released a statement calling organizations to scan their networks and build a crypto inventory. Patero's post-quantum encryption helps protect organizations from these security threats. During this webinar, attendees will:Learn about external and...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.