Back to Search Begin New Search Save Search Auto-Notify
Continuous Diagnostics and Mitigation:...
Continuous Diagnostics and Mitigation:Everything You Need to Know To Utilize DHS’s CDM Program Online Webinar Presented by McAfee DHS’s Continuous Diagnostics and Mitigation (CDM) program is an unprecedented opportunity for agencies to fortify federal computer networks and systems cybersecurity. Join this interactive Webinar and learn how to take advantage and execute on this program. This Webinar will cover how DHS cybersecurity p...
March 18, 2014
Organizer: immixGroup, Inc.
Location: Webcast
Add Favorite
Increasing Your Success with RightNow CX
Increasing Your Success with RightNow CXUnderstand techniques to eliminate your biggest risk Eventus Solutions Group Webinar | As with other SaaS CRM applications, RightNow CX customers often underestimate the need for post-implementation support resources. Overcoming this issue is key to achieving your business objectives and avoiding the risk of a failed deployment. Attend this Webinar to learn techniques for eliminating this risk and maximi...
March 13, 2014
Organizer: immixGroup, Inc.
Location: Webcast
Add Favorite
Solutions Forum: The Drivers of Network...
Solutions Forum: The Drivers of Network Transformation The mission: operate a more cost-effective, agile network.Securely deliver critical services while reducing cost and complexity. Your challenge: create a more cost-effective, agile network using modern technologies. Streamline modernization by delivering radically simplified network architectures with proven data center class performance. Join this discussion to find out how Brocade, an in...
March 12, 2014
Organizer: immixGroup, Inc.
Location: Frederick, MD
Add Favorite
Unusual Suspects: Fighting the Invisibl...
Unusual Suspects: Fighting the Invisible Enemy Part II TIBCO Webinar | Why do cybercriminals have the advantage in the war on fraud? Because these individuals choose their specialties, master their skills, and create networks of colleagues to organize their crimes. As a result U.S. officials face the challenging task of identifying the perpetrators of malicious cyber attacks. The person or persons behind an attack can range from lone actors to...
March 12, 2014
Organizer: immixGroup, Inc.
Location: Webcast
Add Favorite
Enterprise Audit Readiness Through Risk...
Enterprise Audit Readiness Through Risk Analytics and Governance Presented By: immixGroup and IBM How Can My Enterprise Achieve Audit Readiness?As Simone Reba, DLA Deputy Director of Finance, was quoted in the 2012 July/August issue of Loglines Magazine: “Following the rules shouldn’t be something we do if we have the time; it needs to be a way of life,” she wrote. “Audit readiness needs to become a cultural norm....
March 6, 2014
Organizer: immixGroup, Inc.
Location: Fort Belvoir, VA
Add Favorite
Discover How to Create Justifiable Budgets
Using Results-Based Budgeting to Secure Budget Requests and Improve Agency Performance Federal agency leaders and budgeting professionals face continued uncertainty moving into 2014 as budget pressures increase. As a result, agencies are forced to fight for every dollar. Justifying budget requests is made easier when budget allocations are tied directly to agency performance metrics. Utilizing a results-based budgeting approach allocates funds...
March 5, 2014
Organizer: ESVA Inc
Location: Webcast
Add Favorite
EMC Business Partners Programs
EMC Business Partners Programs Simple. Predictable. Profitable. There’s never been a better time to be part of EMC’s Business Partners Program. Their award-winning, competency-based program is more simple, predictable, and profitable than ever before. The EMC Business Partners Program provides incremental rewards and benefits that increase based on Partner’s revenue, training, and Specialty achievements. Partners achieve Spec...
February 20, 2014
Organizer: immixGroup, Inc.
Location: Webcast
Add Favorite
Encryption for the Next Generation Endp...
Encryption for the Next Generation Endpoint: Webinar for DOD Presented by McAfee The average value of a lost laptop is $49,246, according to a study performed by the Ponemon Institute. Data is the lifeblood of your agency and it’s important to understand how a Data at Rest (DAR) solution should work in the DOD environment. McAfee’s Drive Encryption algorithm is newly rewritten to increase both the speed of the initial encryption an...
February 20, 2014
Organizer: immixGroup, Inc.
Location: Webcast
Add Favorite
Sourcefire and Netscout Ft. Belvoir Tech Day
Sourcefire and Netscout Ft. Belvoir Tech Day Presented by Sourcefire and Netscout The call to action is clear – the Army needs a dynamic approach to defending the network. One that uses awareness and automation to provide visibility and context, while constantly adapting to new threats, new vulnerabilities, and everyday network changes. Attend this interactive lunch and explore how to improve your network defense posture, while lowering...
January 15, 2014
Organizer: immixGroup, Inc.
Location: Fort Belvoir, VA
Add Favorite
DISTANCE LEARNING COR LEVEL III REFRESH...
COURSE #004 Distance Learning Individual Price $595COR Level III Refresher Course (Credits: 40 CLP) This course meets all the FAI requirements for the 5-day COR Refresher course granting 40 CLP credits toward COR re-certification for level II and level III personnel who have not been able to acquire he required 40 hours of training over the required two years. This course provides information on recent procurement changes, laws, and advanced c...
December 26-31, 2013
Organizer: The Acquisition Institute Inc.
Location: Online, DC
Add Favorite
Back to Search Begin New Search