Back to Search Begin New Search Save Search Auto-Notify
Maintenance Repair Facility Supplies (M...
Federal agencies now have a fast, effective way to buy maintenance, repair and facility (MRFS) supplies and save! GSA’s dynamic MRFS purchasing channel solution can help you save an average of 8 percent more on MRFS products than previously offered in the federal marketplace. Log on for live webinar training to discover the benefits of GSA’s MRFS solution. Seize your opportunity to attend this short, in-depth webinar, for which you...
August 17, 2022
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
FCL-GSA-0023 Basic Contracting for GSA...
This comprehensive training course covers Federal Supply Schedules contracting and ordering procedures. It addresses placing orders against Multiple Award Schedules, as outlined in Federal Acquisition Regulation (FAR) Subpart 8.4. In this course you will learn about the unique flexibility within the GSA Schedules program. This is a four (4) CLP credit course. Note: This webinar satisfies the FAC-C Level 1 training requirement (equivalent to FA...
August 17, 2022
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
The Attackers Perspective Through Splun...
Join us for a presentation where we will explore the recently published NodeZero App for Splunk, allowing direct Splunk ingestion of its penetration test results.As the industry accelerates toward a threat landscape of attack and defense by algorithm and machine, humans must run at machine speed to manage the stakes of tool misconfiguration, mishandling of logs, and missed patching opportunities. The NodeZero app for Splunk is a force multipli...
August 17, 2022
Organizer: Horizon3.ai Government Team at Carahsoft
Location: Webcast
Add Favorite
GovForward ICAM Workshop
Identity takes center stage as zero trust implementations grow. Identity has been key to individual access to information for some time in government, but it has often been based on physical access cards. As the federal government now begins a move to accommodate more mobile devices in non-traditional environments, agencies are working to consolidate and update their identity systems to protect a broad range of access by individuals and device...
August 17, 2022
Organizer: FCW | Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Meeting Federal Zero Trust Standards wi...
In January, the White House released Memo M-22-09 that mandated, "Federal security teams and data teams work together to develop data categories and security rules to automatically detect and ultimately block unauthorized access to sensitive information." Simultaneously, there has been a 44% increase in workers' use of collaboration tools since 2019. To meet this changing security landscape, federal agencies and the defense industrial base mus...
August 17, 2022
Organizer: AvePoint Government Team at Carahsoft
Location: Webcast
Add Favorite
Workflow Warfare - Bringing AI to DoD's...
The Department of Defense can only transform itself as fast as its slowest workflow. At the foundation of DoD’s various warfare capabilities – including cyber, electronic, and information – is the push to transform its administrative advantage in “Workflow Warfare.” These elements of warfare are the backend processes that make a large agency run effectively and connect IT, HR, finance, procurement, workplace, and...
August 17, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Creative Procurement for Innovation
This panel will focus on bringing together federal professionals to share acquisition best practices. As many are learning in the government digital space, while modern practices and technical capabilities are the outcome, the process of modernizing starts with acquiring the services in new ways. This panel will allow acquisition specialists and leaders to share what they’re doing to transform their digital services, and the agile procur...
August 17, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Vulnerability and Patch Management: Eve...
ProxyLogon. Log4Shell. Print Nightmare – 2021 was the worst year ever for major vulnerabilities and exploits, and there’s no reason to believe the pace is slowing down. Rushed code development, third-party libraries, and a growing array of API bugs are overwhelming companies’ efforts to manage and patch vulnerabilities in their systems and devices. With that in mind, this eSummit will explore how companies can adjust their st...
August 16-17, 2022
Organizer: SC Media
Location: Virtual
Add Favorite
Detroit Cyber Security Summit
The Second Annual Detroit Cyber Security Summit returns on August 16th, In-Person at the Marriott Renaissance Center and Virtually Live-Streamed as it connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $195 each for in-person attendance, giving you access to all Interactive Panels, Discussi...
August 16, 2022
Organizer: Official Cyber Security Summit
Location: Detroit, MI
Add Favorite
Determining the Requirements for Delive...
The Nash & Gray virtual class series provides access to two experts in Government Contracting Intellectual Property law and policy, on a monthly basis. The sessions will dive deep into important and timely issues related to IP and Data Rights for government employees and contractors. And, of course, bring your questions to the sessions.
August 16, 2022
Organizer: Public Contracting Institute
Location: Webcast
Add Favorite
Back to Search Begin New Search