New Cyber Threats & Recoveries in 2023...
A focus on strengthening our cybersecurity workforce should be at the forefront of every agencies’ 2023 goals. The cyber workforce must evolve to address the challenges posed by our adversaries and meet strategic mission requirements, while also doing an exemplary job at managing data security. This requires agencies to reshape their understanding of what data security entails and how the future of cyber security must include prioritizin...
January 12, 2023
Organizer:
ATARC Location:
Webcast
Evaluation Factors: How to Evaluate Proposals
PSHC Office Hours: Evaluation Factors: How to Evaluate Proposals While evaluating proposals can seem like an overwhelming task, it doesn’t have to be; Our experts are here to share their experience and best practices for evaluating proposals. In this session, we will explore how effective evaluation criteria can help you make sound source selection decisions and simplify the proposal review process. Join us this month and earn 1 CLP! Abo...
A Systems Approach to Software Supply C...
CloudBees and Carahsoft are excited to invite you to join us to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Point of attack or point-in-time assessments can't show you the current state of your entire software supply chain, nor where the gaps and vulnerabilities are. They also can't tell whether anything has changed since that assessment, leaving mission-critic...
Don't Be a Victim: Master Threat Huntin...
In this webinar, Jerry Mancini, Chief Strategy Officer at Fidelis Cybersecurity, will discuss how you can elevate your defenses and engage adversaries earlier in the attack lifecycle by taking a proactive cyber defense approach. You will learn the necessary steps to improve the breadth and depth of visibility across your full security stack (including IT, OT, endpoints, network, and cloud) by combining signals in an open XDR solution.
Alliant 2 DPA Training
All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how Alliant 2 can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against Alliant 2. This webinar is not open to...
New & Next: Looking Beyond Boundaries
America is experiencing a technology revolution, fueled by new funding and partnerships, and driven by workforce needs and global competition. From strengthening cybersecurity to training the next-generation workforce, the issues and opportunities presented by emerging technologies are changing government IT and the entire Federal ecosystem. Join MeriTalk, industry experts, and government leaders on Wednesday, January 11, to learn where the te...
January 11, 2023
Organizer:
MeriTalk Location:
Webcast
Uniform Guidance and Grant Accounting G...
Grant accounting and reporting has always delivered unique challenges to accounting and grants management professionals in their efforts to properly identify the sources and uses of funds for specific programs and to report on the programs in accordance with federal agency and Uniform Guidance requirements. Since pandemic relief measures added new dimensions to grant accounting and reporting requirements, this webinar will delve into essential...
Small State, Big Dreams: How Rhode Isla...
Commanding the digital presence of a government entity is a unique challenge. Seemingly small issues in web access, consistency and content can have far reaching repercussions. Working with Acquia and Oomph solutions, the State of Rhode Island reimagined their web presence to kickstart their digital transformation and enhance the citizen experience. Tune in live on January 11th at 10:00am ET to hear experts discuss how the State of Rhode Islan...
Sharing Responsibility for Protecting t...
Cyberattacks against organizations are now often using what might be considered a “bank shot” – planting malicious code in software components before they are used in products. When coders draw upon software libraries, whether open source or proprietary, to build new applications, they unwittingly include the malware. This is a less conspicuous method that threatens the software supply chain and harms organizations’ wil...
January 11, 2023
Organizer:
FEDINSIDER Location:
Webcast
Industry Outlook 2023: Oil, Gas and Chemicals
Despite ongoing trade restrictions and macroeconomic uncertainty, the oil and gas industry will enter 2023 with its healthiest balance sheet yet—a record $1.4 trillion surplus. The US chemical industry has emerged from 2022 well positioned thanks to strong financial performance, reaching a level last seen more than two decades ago. We’ll discuss: What opportunities and investments oil and gas companies may want to prioritize in 202...
January 11, 2023
Organizer:
Deloitte Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.