VETS 2 DPA Training
Who Should Attend: All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how the VETS 2 GWAC can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against the VETS 2 GW...
DORA, SPACE and DevEx: Boost Software E...
Software engineering leaders often struggle to evaluate how the metrics frameworks of DORA, SPACE and DevEx will help them demonstrate software engineering performance. The right set of metrics frameworks can help software engineering leaders make data-driven decisions, but only if they align engineering performance with business value. Metrics focused on software engineering processes and activities alone do not provide insights into the deli...
June 18, 2024
Organizer:
Gartner Location:
Webcast
How North American Government IT Leader...
Leadership transitions are a common occurrence across governments, especially in an election year. Yet, perhaps not at this pace. For the first time in history, more than 70 countries will hold elections this year, impacting more than 4.2 billion people—over half of the global population. Eleven U.S. states are holding gubernatorial elections, the United States will be electing a president, and numerous provincial and municipal elections...
June 18, 2024
Organizer:
Gartner Location:
Webcast
Federal Executive Forum Healthcare IT S...
Demands for the healthcare industry to adopt new technology and enhance customer experience remain high. What strategies have proven successful and what are the priorities for the future?
Map Your Strategic Plan with the Budget
In the public sector, a strategic plan is a critical tool that aims to help move communities forward—but strategic action often falls flat. Aligning financial resources with an organization's strategic goals is crucial for turning the strategic plan into impactful results. Join Government Technology and Euna Solutions for a live webinar where a panel of experts will explore why actioning strategic goals is so challenging for many organiz...
How to Secure Your Agency's Identities...
A zero trust approach to securing your infrastructure is fundamental to reducing risk — and securing identities lies at the core of a successful zero trust strategy. Together, BeyondTrust and Ping Identity deliver the key components of zero trust including privileged identity security, using multi-factor authentication and SSO, with complete visibility and analytics. Join us on June 18 at 1:00pm ET for a tech talk and live demo to see ho...
Women in AFCEA Virtual Happy Hour: June 2024
Join Women in AFCEA for our popular virtual happy hour! Switch off from work, grab a drink, and join your fellow women professionals for a positive chat about life in the IT/Cyber/Global Security industry. This month we'll be chatting with WIA marketing lead, Ariel Glassman, about how to optimize your LinkedIn profile and how to make it work for YOU!
Automate Technology Lifecycle Managemen...
Join us to learn about how ServiceNow can manage all your hardware, software, and cloud IT assets from a single platform. We will explore how you can automate at every stage of the IT asset lifecycle at scale while controlling costs and minimizing licensing and leasing risks. Software Asset Management and Hardware Asset Management will be highlighted in this session, providing you with a comprehensive overview.
June 18, 2024
Organizer:
ServiceNow Location:
Webcast
Ransomware Realities – Beyond the Basics
Ransomware attacks are no longer just a headline—they're a daily reality for public sector organizations. Join us for an in-depth webinar exploration of ransomware, where we'll peel back the layers and reveal the threats and practical defenses. Why You Can't Miss This Webinar:Behind-the-Scenes Insights: Explore exclusive research on ransomware gangs, their motivations, and their connections to global events.Early Detection Tactics: Learn...
Security Operations Summit
From a constantly evolving threat landscape and expanding attack surface to a significant shortage of skilled professionals, many security teams face serious challenges. Today’s cybersecurity threats are more sophisticated and pervasive, and threat actors typically have plenty of time to achieve their objectives, particularly now with AI-driven tools at their disposal. With AI, threat actors have another “easy” button for car...
June 18, 2024
Organizer:
Fortinet Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.