Modernizing the Traditional WAN "Edge"...
Modernization is the process of adapting something to modern needs or habits. In Federal IT, this definition might be expanded to include the need to remain compliant to Presidential Executive orders, NIST standards, and other guidance. Join Fortinet and Carahsoft for a series of "Modernization" webinars that will focus on the components of Federal IT Modernization. Leveraging the security-driven networking approach, converging networking and...
GSAXcess Training - Reporting Your Agen...
FREE GSAXcess Training on how to report your agency's Excess Personal Property. This training will teach you how to electronically report your agency's excess personal Property into GSAXcess, for nationwide screening. You will also learn how to upload photos and documents. Registration is required for this training - each participant will get their own unique entry URL so you must register to be granted access to this training. Your entry link...
Cyber Security Healthcare & Pharma Summit
The Inaugural Cyber Security Healthcare and Pharma Summit is a one-of-a-kind conference designed for exclusively invited Healthcare Executives in the Eastern Half of the US, in need of innovative solutions to protect their company’s critical data & infrastructure. This next-generation event will provide a virtual space for business leaders to learn about the latest cyber threat landscape and evaluate the industry’s most cutting...
Women In Tech Virtual Summit
The ATARC Women In Tech Virtual Summit is on March 1, 2022 from 10:00 AM - 12:30 PM ET. This event will feature women from within the STEM field as they talk about what it took for them to get to where they are today, and what steps need to be taken to further the advancement of Women in STEM.You can expect to hear detailed conversations about what challenges they faced as they entered the STEM workforce as women, and the progress that has bee...
March 1, 2022
Organizer:
ATARC Location:
Webcast
Dallas Cyber Security Summit
The Seventh Annual Dallas Cyber Security Summit returns on February 25th, In-Person at the Dallas Marriott Downtown and Virtually Live-Streamed as it connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $195 each for in-person attendance, giving you access to all Interactive Panels, Discussio...
Subcontracts Management: What Prime Con...
You need a Subcontractor - now what? The Federal Acquisition Regulations sets forth a number of requirements. Prime Contractors must follow these requirements when issuing subcontracts. This webinar will discuss these requirements and how they impact subcontract formation as well as prime contractor procurement policies and procedures. Course Topics Covered: Overview of common FAR requirements the Prime must follow Understanding Prime Contract...
ICIT 2022 Virtual Briefing I Level Up:...
To quantify the cybersecurity talent shortage, Forbes reported nearly a half a million unfilled cybersecurity jobs in America. An ongoing debate is what leaders can do to close this talent gap and a recurring recommendation is providing training and skills development. Gamification at the simplest level is a neuroscience “hack” that encourages ongoing participation with subject matter because of the release of dopamine from rewards...
Effective Market Research using Market...
In this course, you will learn why market research is conducted, when and how to conduct market research; the regulatory nature of FAR Part 10 and how it ties into other decisions such as acquisition planning (Part 7) small business set-asides, commercial items, contract type selection and more, and how to get better results by making your data collection methods easier. The course will use real life scenarios, examples from GSA’s market...
February 24, 2022
Organizer:
GSA Location:
Webcast
INTERFACE Dallas-Oklahoma 2022
WELCOME TO INTERFACE Dallas-Oklahoma 2022! IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to needs for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations, to he...
Raleigh Cybersecurity Conference
When it comes to staying on top of your organization’s security needs, it is vital to make connections and learn from experts. Attend the Charlotte Cybersecurity Conference with thought leaders and luminaries to gather insights on the latest trends and threats in cybersecurity. Join this event to meet face-to-face with your fellow security professionals and solution providers, and hear from experts and industry luminaries on what it take...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.