Back to Search Begin New Search Save Search Auto-Notify
Engage Audiences Across Screens with Po...
Utilize Vast Asset Libraries to Turn Inspiration Into Creation Creative professionals today are constantly innovating and collaborating with teams and colleagues to find the best way to communicate effectively, but how can they ensure that their messaging will be engaging, informative, and available to all members of their target audience? As our digital spaces become more visual, agencies must rely on digital assets such as graphics, images,...
March 13, 2023
Organizer: Adobe Government Team at Carahsoft
Location: Webcast
Add Favorite
Huntsville Cyber Security Summit
The Inaugural Huntsville Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $195 each, giving you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception. Top 8 Reasons to Attend the Cyber Security Summit Learn - Our conferences...
March 10, 2023
Organizer: TechExpo Top Secret
Location: Huntsville, AL
Add Favorite
Detroit Cybersecurity Conference
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizatio...
March 9, 2023
Organizer: FutureCon
Location: Southfield, MI
Add Favorite
Risk Management: A Group Effort
Our digital world is more expansive than ever before, giving access to unprecedented capabilities for our business, government, and personal use. As digital transformation accelerates, the risks associated with cyberattacks grow and affect every aspect of modern business, from customer service to government operations to smart infrastructure. Cyber or Business resilience must be a critical component of all security strategies — yet it i...
March 9, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Love, Lies & Billions Lost: Eliminating...
Every year, federal agencies dispense hundreds of billions of dollars in grants, loans, disaster relief, tax refunds, disability payments, insurance claims, pensions, and more. But the financial fraud, waste, and misuse of these program funds have resulted in billions lost along with diminishing citizen trust. To avoid the loss of "citizen love," agencies must stay ahead of fraudsters with a scalable, connected, and real-time technology that s...
March 9, 2023
Organizer: Aerospike Government Team at Carahsoft
Location: Webcast
Add Favorite
Deception Strategy in Zero Trust Environments
A zero trust architecture (ZTA) is an enterprise cybersecurity architecture that is based on zero trust principles and designed to prevent data breaches and limit internal lateral movement. In a zero trust environment, identity stores are a primary attack surface where any compromise of identity can create significant risk. Endpoints and any credentials they contain are also a persistent source of risk; when an adversary escalates privileges a...
March 9, 2023
Organizer: Acalvio Government Team at Carahsoft
Location: Webcast
Add Favorite
PWS, SOO, SOW - Finding the Best Fit
Do you know the difference between a Statement of Work (SOW), a Performance Work Statement (PWS) and a Statement of Objectives (SOO)? How do you decide which to use, especially as it relates to professional services acquisitions? Join our experts to learn about the pros and cons of each, along with some examples and lessons learned from using each option. Earn 1 CLP! A SOW is typically used when the task is well-known and can be described in s...
March 9, 2023
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
The Future of FedRAMP: Reach Your Secur...
The FedRAMP Authorization Act becoming law is a promising development for government agencies prioritizing security to reimagine old processes, workflows, and experiences. FedRAMP’s codification provides government agencies with easier access to advanced security solutions that enable agility and flexibility to meet their modernization goals. Join our complimentary webinar to learn more about the FedRAMP Moderate authorization and see ho...
March 9, 2023
Organizer: Adobe Government Team at Carahsoft
Location: Webcast
Add Favorite
GSA 101 Who We Are and What We Do
Who is GSA? Come learn what GSA offers! We will provide overview of GSA's Federal Acquisition Service, Customer Accounts & Stakeholder's Engagement (CASE) and the role of your Customer Service Director. Also, we will share brief description of GSA offerings which include useful acquisition vehicles, market research and training information. Please come join us Thursday March 9, 2023 for this free, 1 CLP course, with time set aside for Q&A.
March 9, 2023
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Implement the New NIST RMF Standards an...
What are the impacts on the new Federal Information Security Management Act (FISMA) reporting resulting from the new documents released in 2022? Some of the key documents are: Presidential Executive Order 14028 that has increased emphasis on advancing toward “Zero-Trust Architecture” and “Endpoint Detection and Response (EDR)” and moving systems to FedRAMP clouds. Office of Management and Budget’s (OMB’s) M-...
March 8-9, 2023
Organizer: Digital Government Institute
Location: Virtual
Add Favorite
Back to Search Begin New Search