Expanding Strategic Security Measures f...
There has never been a better time than now to enhance the security of your organisation. Given geopolitical activity in the world today, and with a growing business reliance on cloud-based connectivity, cyber threat activity poses a real concern for all connected businesses. Recently, the White House published a fact sheet advising companies to mandate multi-factor authentication on IT systems to make it harder for attackers to get onto the s...
Dell Technologies Federal Happy Hour
Dell Technologies & Carahsoft would like to invite you to our happy hour reception for the Super Computing 2022 Conference. Please join us on Tuesday, November 15 at 5:00 pm for cocktails, appetizers, and networking opportunities.
VETS 2 DPA Training
Who Should Attend: All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how the VETS 2 GWAC can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against the VETS 2 GW...
Cyber-SCRM Educational Training Series
You are invited to join the Cybersecurity Supply Chain Risk Management (C-SCRM) Acquisition Community of Practice (ACoP). Since the launch of the C-SCRM ACoP, GSA and CISA have been co-leading an effort to broaden the level of awareness and develop agency maturity in the areas of acquisitions, supply chain risk management, and cybersecurity across the Federal Government for information communication technology and services (ICTS). Why Should Y...
Insider Threats for Systems Integrators...
Join the Proofpoint team and dive into the Insider Threats impacting your organization and new Federal requirements for the Federal Systems Integrator community. Vulnerable employees, bad actors, and cybercriminals continue to threaten national security, but with the right cybersecurity solutions your organization can prevent and protect against insider threats. Learn how Proofpoint can provide deeper insight and mitigation strategies. In this...
Keeping the Government Workforce Produc...
The hybrid workforce and direct-to-app architectures have rendered legacy security architectures obsolete while dramatically increasing our attack surface. Cloud based security with ZTNA 1.0 approaches have emerged as potential solutions, but they only solve part of the problem, failing to adequately secure today's work-from-anywhere users and direct-to-app architectures.This session will explain a modern approach to ZTNA and how it is imperat...
Security Programs That Thrive in Econom...
With economic conditions causing concerns, many security teams with limited resources are sacrificing security initiatives for cost containment. All while expanding attack surfaces are requiring more time and attention than ever before. If this problem sounds familiar, join us to learn how managed detection and response solutions, integrated with existing security investments, can more quickly establish an acceptable ROI while dramatically re...
Directive M-19-21: Record Digitization
Directive M-19-21 is driving Federal agencies to digitize their hardcopy records and shut down their records storage facilities. Join our two-part Archive360 webinar series and learn what your agency needs to do to reduce the costs and risks of digitizing and managing paper records. Part 1: Directive M-19-21: Next Steps - What To Consider After Digitizing Record Keeping Since Directive M-19-21's announcement, the big question is: how to store...
Become A Certified Capture Manager Lear...
Become A Certified Capture Manager Learn To Win Government Contracts. (Class One) Official Enrollment: www.CaptureManagement.org Come join us weekly as we train and prepare you to capture government contracts. These sessions are designed to prepare those enrolled in the Certified Capture Manager (CCM) Program to pass the CCM Exam and to become certified professionals. Also, these classes are open to all GCA members, partner members and the pub...
Roadmap to Mission Success with Governm...
Join us for our webinar on November 15th as Salesforce experts provide a guide to assist you with your data security needs. Attendees will have the opportunity to discuss the roadmap to achieving IL5 compliance as well as how Hyperforce can aid them in empowering their DoD members in supporting the mission from anywhere.
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.