Business Development Masterclass
BUILD TRUST AND CUSTOMER AFFINITY WITH EMOTIONAL INTELLIGENCE Whether you’re new to business development, you’re in a capture or supporting role, or you’re a seasoned professional, this course is for you. You will learn how to differentiate yourself by creating meaningful connections with customers and stakeholders. Secure Your Seat If You Are: Concerned about being perceived as “that” salesperson, a beltway band...
November 29 - December 8, 2022
Organizer:
Hi-Q Group LLC Location:
Virtual
FutureCon Virtual Western Conference
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizatio...
December 7, 2022
Organizer:
FutureCon Location:
Virtual
The Start of Your Ansible Automation Ad...
Federal agencies require robust software capabilities to carry out their agency-specific missions and day-to-day operations. Enterprise-wide automation has become a necessity to keep pace with the evolving demands of modern IT.Red Hat Ansible is uniquely positioned to help your agency succeed with simple, powerful and agentless automation.Join Red Hat experts onsite to learn about how Ansible Automation can modernize your virtual infrastructur...
Edge Computing: Bringing Mission from t...
Edge is a strategy to deliver insights and experiences at the moment they're needed. Red Hat can help federal agencies gain near real-time data insights with technologies like automation, containers, Kubernetes and artificial intelligence and machine learning (AI/ML) to meet the speed of relevance. Join us online to match the buzz around "Edge Computing" with the business and technical context necessary and critical to your mission by learning...
Scale Your Cyber Resiliency with Threat...
Anomali has made its mark delivering threat intelligence-powered detection and response with its portfolio of solutions: Match, ThreatStream, and Lens. We've expanded upon that leadership position by introducing The Anomali Platform, a high-performance, big data, cloud-unified threat detection and response solution.Join us on December 7th for a threat intelligence webinar where Mark Alba, Chief Product Officer, and Scott Dowsett, Field CTO of...
MAS Industrial Products and Services Training
Join this virtual meeting for an introduction of the GSA's MAS Industrial Products and Services. In this virtual 1 hour training session you can expect: An introduction of the Industrial Products and Services To have a better understanding of the tool and hardware solutions that are available within MAS as well as how to use the schedule’s Home Improvement Center. Additionally participants will be introduced to the equipment rental secti...
ArcGIS Pro Geospatial Environment with...
ArcGIS is the world's leading Geographic Information System (GIS) software and analytics platform from Esri. Join us to learn how desktop virtualization for ArcGIS Pro with Microsoft's Azure Virtual Desktop can significantly improve performance, maintainability, and reduce costs of your GIS environment.During this webinar, we will cover topics including:The benefits of software virtualization in the cloudHow Azure Virtual Desktop has been used...
Implementing a Zero Trust Architecture...
Agency zero trust policies and strategies are in place. Now it’s all about implementation and defining success. During this exclusive webinar, moderator Jason Miller will discuss zero trust in 2023 and beyond with agency and industry leaders. Learning objectives: Current state of zero trust The pillars of zero trust Measuring success of zero trust strategy
December UiPath & Alpha Omega Integrati...
In this session, attendees will learn about: A multi-disciplinary pragmatic approach required to reduce the time it takes to complete a system going through ATO, or for re-certifying a system Alpha Omega Integration, A2O™ solution built in collaboration with the industry-leading automation vendor UiPath How A2O™ automates The discovery of ATO processes and tasks The collection of data from manual controls Executing controls ...
Protecting Your Identity Attack Surface
94% of organizations have experienced an identity-related breach, making real-time identity threat detection and response a critical strategy for security teams.Regardless of if your users connect from a PC, Mac, or Chromebook (the primary identity store for most schools), Active Directory (AD) represents an especially attractive and vulnerable target for adversaries.Join SentinelOne as we cover:Real-time vulnerability assessment around identi...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.