Back to Search Begin New Search Save Search Auto-Notify
Amazon Omics: Hands-On Workshop
PTP and AWS invite you to join us for this 3-hour hands-on lab to gain valuable expertise working with Amazon Omics. Upon completion of the workshop, attendees of this session will be able to: Articulate the value proposition of Amazon Omics Load sequencing data into Omics Storage Run a genomics secondary analysis workflow through Omics Workflows Load VCFs (variant data) into the Variant store Load variant annotations into the Annotation store...
September 19, 2023
Organizer: Amazon Web Services (AWS)|PTP
Location: Webcast
Add Favorite
Cybersecurity Standards Scorecard
In the 1990s, government agencies, industry groups, and cybersecurity researchers started creating cybersecurity standards, and these standards led to cybersecurity regulations and laws that dictate to organizations what they must do to protect their data. Today, there are dozens of standards dictating thousands of cybersecurity controls that organizations can consider when building their cybersecurity plans. Every year more standards are rele...
September 19, 2023
Organizer: SANS Institute
Location: Webcast
Add Favorite
VETS 2 DPA Training
Learn how the VETS 2 GWAC can support your agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA). Who Should Attend: All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how the VETS 2 GWAC can support their agency IT project in...
September 19, 2023
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Future Cities
Across the nation, cities are confronting a full roster of opportunities. Federal funding from the Investment in Infrastructure and Jobs Act and the Inflation Reduction Act has allowed city governments to invest in their communities like never before. And whether that funding is used to improve hard infrastructure, connect communities to reliable broadband, or drive innovations that better support government, leaders are empowered in new ways...
September 19, 2023
Organizer: Route Fifty
Location: Webcast
Add Favorite
Staying Ahead of Fraud
When organizations want to mitigate fraud, they usually implement a solution to combat the specific type of fraud they’re experiencing. This may sound like a practical strategy, but there’s an adage about fraud: When you squeeze a balloon in one place, the air travels to another portion of the balloon. Fraud works the same way — when there’s a decline in one type of fraud, almost certainly, other types begin to peak. Em...
September 19, 2023
Organizer: Government Technology
Location: Webcast
Add Favorite
Next-Gen Defense: Unleashing the Power...
Leveraging AI and implementing zero-trust security are critical parts of the movement to modernize the U.S. military. Kubernetes experts will provide insights and besThe U.S. Department of Defense’s Software Modernization Strategy calls for gaining a competitive advantage to achieve strategic and tactical superiority. Leveraging artificial intelligence (AI) and implementing zero-trust security are critical parts of the movement to modern...
September 19, 2023
Organizer: AFCEA International
Location: Webcast
Add Favorite
Trusting Leaders in a Zero Trust Environment
As State and Local agencies pursue their zero trust goals taking into consideration the Executive Order 14028, “Improving the Nation’s Cybersecurity,” it is easy to focus on technology solutions. But that overlooks something fundamental about both the challenge and the purpose of moving to zero trust – the human beings that will use the redesigned systems to better meet their agency’s mission. If a zero-trust impl...
September 19, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
How Cloudflare Helps Financial Institut...
The financial services industry continues to be a popular attack target, in large part due to the sensitive data and personal information financial institutions safeguard. These institutions are subjected to data scraping, credential stuffing, network intrusion attempts, and more — all while needing to provide fast, reliable service for their end-users and remain compliant with the strictest possible privacy and security regulations. Q2...
September 19, 2023
Organizer: SANS Institute
Location: Webcast
Add Favorite
Exploring the U.S. Market Webinar Serie...
There are business opportunities abound in and with the U.S. – you just have to know where to find them and how to navigate through the rules and regulations. Crowell presents the third installment of a series of IBJ/IJE webinars to help you successfully do business in and with the U.S. Based on the results of the survey launched during our first session of this series, we will, this time, focus on one of your most preferred webinar topi...
September 19, 2023
Organizer: Crowell & Moring
Location: Webcast
Add Favorite
Taking CMMC Seriously - What Is The Cos...
The DoD recently submitted the CMMC rule to OMB so the clock is ticking. If planning for CMMC has become a painful distraction from running your business – or worse, you’ve put it off so it won’t be – the time has come to get ready for compliance. During this webinar, you’ll learn: What are the major components of CMMC that drive compliance costs, and how to plan effectively How to begin building your CMMC strateg...
September 19, 2023
Organizer: C3 Integrated Solutions
Location: Webcast
Add Favorite
Back to Search Begin New Search