Back to Search Begin New Search Save Search Auto-Notify
How to Fight and Win Space Wars
This webinar will review some of the foundational concepts of space warfare, illustrate some of the previous space wars or space “incidents” that have occurred in the past, and go into detail of the various space attacks that have been occurring due to the Ukrainian conflict starting in 2014 until the present day.
March 7, 2024
Organizer: Association of Old Crows
Location: Webcast
Add Favorite
Climbing the Mountain: A New Era for Go...
In an era where cyber threats are increasingly sophisticated, the need for robust cybersecurity strategies in government IT departments is more pressing than ever. These threats are continuously evolving, leveraging new technologies and exploiting vulnerabilities in innovative ways. As a result, there is an urgent need for IT sectors to adapt and enhance their cybersecurity strategies. This adaptation isn’t just about implementing new te...
March 7, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Overcoming Legacy Infrastructure Throug...
Educational institutions and state and local agencies historically have been challenged to keep up with technological advancements – their budgets are tight, their users are increasingly distributed post-pandemic, and they face significant operating expenses from maintaining legacy architectures and equipment. Digital transformation is appealing, but for many organizations the challenge is where to start. As the generation of data has ex...
March 7, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Buying Through 2GIT BPA to Meet Your IT...
This introduction to GSA’s 2GIT BPA will show you what IT products you can buy and how to easily buy through the 2GIT BPA. You will learn: The wide selection of IT products (hardware, software) available through 2GIT How you can easily buy through 2GIT (GPC card, RFQ), along with tips for making buying even easier Why buy through 2GIT - the many advantages, including availability of products you need, ease of ordering, small business cre...
March 7, 2024
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Third-Party Risk Management: It's Time...
The gap is widening. Your Third-Party Risk Management (TPRM) challenges aren't getting any easier—onboarding still takes too long; you have a backlog of assessment work; and you're not covering as much of your vendor portfolio as you know you should. There are more vendors every day and there is more work to do, yet your TPRM resources have stayed relatively flat. It's impossible to keep up. It doesn't have to be that way. Forward-thinki...
March 7, 2024
Organizer: ISACA
Location: Webcast
Add Favorite
Forensics in the CISA Incident Response...
The Cybersecurity and Infrastructure Incident Response and Vulnerability playbook released by the Cybersecurity and Infrastructure Security Agency (CISA) in November 2021 lays out a detailed plan for how agencies should implement communication, technology, and policy for Incident response. Forensic collection, preservation, analysis, and reporting are important parts of this playbook. This presentation will discuss the Incident Response playbo...
March 7, 2024
Organizer: Digital Government Institute
Location: Webcast
Add Favorite
Education Leaders' Guide to the New Cyb...
When critical infrastructure is hit by a disruptive cyberattack, national security officials need to know about it as soon as possible. That’s the guiding principle behind new rules coming soon from the U.S. Cybersecurity and Infrastructure Security Agency (CISA). In March 2022, the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) was signed into law. Enactment of CIRCIA means CISA will require covered entities d...
March 7, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
Personal Property Abandonment & Destruction
Come learn about the Abandonment & Destruction of Personal Property directly from Federal Management Regulation (FMR) 102.36. This training will provide you with information as to what kind of property you can consider for abandonment and destruction, what are the rules, under what conditions, and when you should consider taking such action. You will also learn the two questions that you may ask prior to considering this task. This class p...
March 7, 2024
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Effective Market Research (MRAS)
Target Audience: Federal/State/Local Agencies and Military Attention all public sector employees in the contracting and acquisition career field! In GSA's Market Research As a Service (MRAS) Customer Training: Effective Market Research (Fed/Military), you'll learn the importance of market research, how and when to conduct it, and how to get the best results by making your data collection methods more efficient. You'll also delve into the regul...
March 7, 2024
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Your Organization Is Ready for AI, But...
Many fear that data is artificial intelligence's greatest weakness. Do you have enough data? Do you know the provenance and lineage? There are many proposed metrics to assure the data is ready, but have you considered that AI processes are not equal or even similar in many cases? AI-ready data is not about metrics and provenance as a standalone assessment. It is an ongoing experience, and if you fail to comprehend it, your data assurance may j...
March 7, 2024
Organizer: Gartner
Location: Webcast
Add Favorite
Back to Search Begin New Search