Tampa | Government Contracting FAR ...
Avoid costly mistakes – get your overhead rate right the first time. Every year, firms are held liable for overhead rate errors. Given the complexity and ever-evolving nuances of FAR, ensuring accuracy is critical for your firm’s success in government contracting. Join SN’s in-person, 2-day FAR training to gain expert guidance from the nation’s leading FAR authorities, Tony Machi and Robert Jones. Whether you’re a...
CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
Minneapolis Cybersecurity Conference
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizatio...
April 10, 2025
Organizer:
FutureCon Location:
Minneapolis, MN
Axonius Adapt Boston 2025
Adapt to the Future of Cybersecurity - Get Ready to Take Action! We are taking Axonius Adapt on the road! Join us in Boston for Adapt in Action. This one day event is for Security, IT, and Risk professionals collaboratively working towards a more resilient cyber future – where teams have full actionability over their distributed technology footprint, feel prepared for just about anything, and have time to become more proactive and work o...
April 10, 2025
Organizer:
Axonius Location:
Boston, MA
Harnessing Generative AI: Transforming...
As federal agencies confront increasingly sophisticated cyber threats, the need for robust cybersecurity programs have never been greater. Generative AI offers a transformative opportunity to enhance key aspects of federal cybersecurity, including threat detection, vulnerability management, security operations, and compliance activities. Moving beyond traditional, human-driven analyses and pre- defined rules, Generative AI enables capabilities...
April 10, 2025
Organizer:
ATARC Location:
Webcast
Cyber Resilience with Forward Networks:...
Are you looking to stay ahead of:Latest cybersecurity threatsBest PracticesCutting-edge technologiesIf you answered yes to any of the above, join us for an exclusive 5-part webinar series covering key topics in cyber risk management, threat detection and advanced security strategies with the opportunity to earn 1 CPE credits per webinar! March 13 - Cyber Data Call Handling March 27 - Cyber Threat PrioritizationApril 10 - Zero Trust Network Val...
The Future of ID Management: Public Sec...
As the public sector continues to embrace digital transformation and zero trust security environments, the need for robust identity management is paramount. “The Future of Identity Management: Public Sector Best Practices” virtual workshop will explore cutting-edge strategies and solutions that ensure secure and efficient identity verification and management. Attendees will gain an understanding of how to implement best practices t...
Harnessing AI & ML for Smarter Cybersecurity
As cyber threats grow more sophisticated, agencies must move beyond static defenses to intelligence-driven security. And while AI and machine learning (ML) enhance efficiency by detecting anomalies, forecasting risks, and accelerating response, agencies still need to address concerns about verification of alert evidence and suggested response actions. AI-powered security integrates with existing tools like Security Information and Event Manage...
April 10, 2025
Organizer:
FedInsider Location:
Webcast
ADF Solutions Webinar Mobile the Art of...
Mobile devices are ubiquitous in digital media investigations and serve as vital lifelines for individuals, connecting them to the world. However, triaging these devices—whether for early case assessments or in victim, witness, or consent scenarios—presents growing challenges in accessing essential data. Register now for this complimentary webinar to learn how Intelligent Triage empowers practitioners to preview devices on the spot...
PSHC Office Hours: Blanket Purchase Agr...
A GSA Multiple Award Schedule Blanket Purchase Agreement (BPA) is an agreement established by a government buyer with a Schedule contractor to fill repetitive needs for supplies or services (FAR 8.405-3). Buyers reduce administrative burden by eliminating repetitive activities such as searching for sources and needing to prepare new, complete requests for quotes for each Schedule order. Join us this month to learn how BPAs can help you streaml...
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.