Back to Search Begin New Search Save Search Auto-Notify
The Digital Revolution: Workforce Impact
The promise of government’s digital revolution will come from the use of data to inform decision making and mission delivery. Combining data from the Internet of Things with agency databases is creating the raw materials for real improvement in mission delivery. This webinar will address how employees can benefit from knowledge sharing to use data in new and innovative ways.
April 10, 2018
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Protecting Critical Data from a Cyber Attack
Once an organization is infiltrated, data is usually compromised within hours. The inability to detect an intruder gives hackers time to not only expose confidential information, but also destroy mission-critical data. Could your organization survive an attack? Join this complimentary webinar to explore Dell EMC's Ransomware and Cyber Recovery solution and its advanced protection services to ensure the "heartbeat" of your organization remains...
April 10, 2018
Organizer: Dell EMC Gov Team at Carahsoft Technology Corp
Location: Webcast
Add Favorite
FCL-GSA-0041 GSA Alliant and Alliant Sm...
Governmentwide Acquisition Contracts (GWACs) enable federal agencies to buy cost-effective, innovative solutions for information technology (IT)requirements. Most, if not all, government agencies have a need to buy IT services and solutions. GSA has made this convenient through its GWAC Programs. In this course, you will learn about the Alliant & Alliant Small Business GWAC Program offered through GSA. This is a two (2) CLP credit course....
April 10, 2018
Organizer: GSA
Location: Webcast
Add Favorite
Dell EMC Ransomware & Cyber Recovery Webinar
Protecting Critical Data from a Cyber Attack Date: Tuesday, April 10, 2018Time: 11:00am ET; 8:00am PTDuration: 60 minutesLocation: Online *Register and attend this webinar to receive 1 CPE credit. Once an organization is infiltrated, data is usually compromised within hours. The inability to detect an intruder gives hackers time to not only expose confidential information, but also destroy mission-critical data. Could your organization survive...
April 10, 2018
Organizer: Dell EMC Gov Team at Carahsoft Technology Corp
Location: Webcast
Add Favorite
SANS 2018
SANS is returning to Orlando for one of our largest events of the year: SANS 2018! Please join us April 3-10, and choose from over 45 information security courses. SANS courses are comprehensive and engaging, offering you hands-on training with actionable information you can implement immediately upon returning to work. Our courseware is based on real-world threats and situations from industry experts with practical experience in the field, ma...
April 3-10, 2018
Organizer: SANS Institute
Location: Orlando, FL
Add Favorite
Western Grants Forum: OMB Super Circula...
Learn how to better manage your Federal grants and subawards during the 2018 Western Grants Forum: Super Circular Training & Cost Principles Deep Dive. The Uniform Grants Guidance (a.k.a. the Omnicircular or Super Circular) has detailed rules, including cost principles, that govern how grant funds are to be managed and spent. Failure to follow the Super Circular's requirements can lead to enforcement actions, ranging from disallowances and...
April 5-6, 2018
Organizer: Nonprofit Law Training
Location: Seattle, WA
Add Favorite
IT Modernization Summit
Legacy systems cripple federal agencies. They hamstring innovation, leave information vulnerable to bad actors, cost more and more to maintain as they age, and push away talented personnel who want to work with the latest technology. The White House and Congress have made major steps of late, though, to bring agencies into the 21st century, releasing major IT modernization policy and providing funding to jumpstart a governmentwide tech refresh...
April 5, 2018
Organizer: FedScoop
Location: Washington, DC
Add Favorite
F5 Government Technology Symposium
Federal Agencies are under ever increasing pressure to meet the Cloud First mandate and still maintain their security and regulatory compliance postures. Complicating matters even further, the 2017 Verizon Data breach report highlighted that 62% of the breaches involved application level hacking, and 81% of the hacking incidents involved weak or stolen passwords. This evolving combination of attack vectors makes cloud based applications a part...
April 3-4, 2018
Organizer: F5 Networks Government Team at Carahsoft
Location: Webcast
Add Favorite
Importing 201 Seminar in Anaheim
Seminar Information: Importers: Are you prepared for a Customs Audit? Sign up for our Import Audit Class and protect yourself from business disruption, fines and penalties that can result from regulatory intervention from U.S. Customs and Border Protection. Learn how to prepare for a Focused Assessment. Explore strategies for self-auditing your import program. Learn record keeping requirements, how to exercise reasonable care, how to create a...
March 30, 2018
Organizer: Global Training Center
Location: Anaheim, CA
Add Favorite
Advanced Capture Management - Bid ...
Masterfully facilitate brainstorming sessions such as Black Hats, Win Strategy, and CONOPS workshops; perform advanced competitive analysis; create advantageous teaming arrangements; apply formulas to solution development; and much more. The course also focuses on measuring and improving cost-efficiency and effectiveness of the capture team. This course takes capture management to the next level showcasing what does it take to maximize win pro...
March 29-30, 2018
Organizer: OST Global Solutions, Inc.
Location: Rockville, MD
Add Favorite
Back to Search Begin New Search