VETS 2 DPA Training
Who Should Attend:All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how the VETS 2 GWAC can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against the VETS 2 GWA...
Microsoft Discovery Hour: Service Reima...
Good service is good for business. Research proves it: a report from Forrester Consulting shows that organizations that deliver good service earn $10 billion more in incremental revenue.But rising customer expectations bring greater challenges to meet those demands while still supporting frontline workers and providing customers quality self-service options. That’s where AI-powered solutions like Microsoft Copilot and Microsoft Dynamics...
December 16, 2025
Organizer:
Microsoft Location:
Webcast
Secure the Use of GenAI Apps and Defend...
Securing your SaaS and GenAI apps in the era of AI, is more important than ever before. Having a clear understanding of how to adopt effective tools to handle the spawl and ensure safe configurations is critical in maintaining a strong security posture. Unified visibility across your SaaS apps and identities is necessary to be able to detect compromised accounts. Siloed monitoring isn’t enough. In this webinar, we will guide you through...
December 16, 2025
Organizer:
Microsoft Location:
Webcast
How to Create Healthy Organizations — a...
Research shows that a strong internal culture focused on high performance is critical to the effective delivery of essential public services. In times of stress or transition, that healthy culture works to keep the mission on track and employees engaged. Leaders at every level can follow practical strategies and evidence-based practices to improve the organizational health of their teams and support their employees at the same time. Federal Ne...
Eliminate Attack Pivoting with Network...
Consequence boundaries connect networks with dramatically different worst-case consequences of compromise – for example, IT networks connected to base microgrids, building automation or other OT networks. At consequence boundaries, we must eliminate the possibility of online attacks pivoting into our high-consequence networks – an emerging space of network engineering. Join Waterfall Security and Carahsoft to explore how network en...
Modernizing Within Budget: Smart IT Pla...
Every government wants modern systems, but no one has an unlimited budget. So how do you make meaningful progress without overusing resources or stalling out? The key lies in aligning modernization initiatives with total cost of ownership (TCO) and return on investment (ROI), and knowing what to prioritize, when, and how. Join us for a practical conversation on how state and local IT leaders can make smarter decisions about modernization, infr...
Jingle and Mingle Holiday Speed Networking
Join us for a festive virtual "Jingle & Mingle," where holiday cheer meets rapid-fire networking! Connect with fellow attendees through rotating breakout rooms, lighthearted conversations, and a dash of friendly competition. We'll kick things off with holiday trivia, so bring your best guesses and maybe a mug of hot cocoa.Festive attire, ugly sweaters, holiday hats, or any cheerful accessories are highly encouraged. Let's share some laughs, ma...
SANS@Night - Pay to Play: Surviving and...
When cybercriminals hold your data hostage, do you pay the ransom or call their bluff? In 2024, only 25% of organizations paid ransoms—an all-time low—yet those who did pay still only achieved 46% full data recovery. In this talk, we'll dissect the high-stakes world of ransomware negotiations, where million-dollar decisions happen under extreme pressure. Drawing from real-world negotiation transcripts and the groundbreaking Coinbas...
How to Buy Cloud Computing for Government
This webinar shares how agencies can procure cloud computing. You’ll learn about the advantages of cloud computing, and how to use GSA’s contracts to make the cloud acquisition process easier and more efficient. There’s no charge for this event! Join us to:Get valuable information about cloud computing and its benefits to governmentGain an overview of how GSA helps agencies with cloud acquisitionLearn everything you need to k...
ATARC Cyber AI Convergence Working Grou...
ATARC is excited to kick off our Cyber AI Convergence Working Group with an exclusive virtual roundtable featuring a curated panel of government leaders in the integration of artificial intelligence and cybersecurity spaces. This inaugural session will help shape the group’s direction and set its key priorities moving forward.Held under the Chatham House Rule, this candid and collaborative discussion will provide a unique opportunity to...
December 16, 2025
Organizer:
ATARC Location:
Virtual
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.