Office Hours — FAR 8.4 and FAR 15: Role...
The Federal Acquisition Regulation (FAR) provides the regulatory foundation for buying products and services on behalf of the federal government. FAR 8.4 provides ordering procedures for GSA Schedules and FAR 15 addresses contracting by negotiation. Which method should you use? What are the advantages of each method? What are the restrictions? Join us this month for an insightful overview comparing GSA Schedules and FAR 15. Earn 1 CLP! About O...
Adding System Observability to Monitori...
Government agencies at all levels are under pressure to modernize their IT infrastructure to meet the evolving needs and expectations of their customers, stakeholders, and employees. The ubiquity of smart phones and tailored apps in the broader world have raised user expectations for government systems to work the same way. Modernization certainly presents a host of opportunities to improve agencies’ performance, but it comes with its ow...
October 9, 2024
Organizer:
FedInsider Location:
Webcast
VMware Cloud Foundation Tech Day in Pat...
Explore VMware Cloud Foundation (VCF), a ubiquitous hybrid cloud platform for both traditional enterprise and modern applications. VMware Cloud Foundation provides a complete set of software-defined services for compute, storage, network, container and cloud management. The result is agile, reliable, efficient cloud software defined infrastructure that offers consistent operations from garrison to tactical edge. Join us at our upcoming in-pers...
Revolutionizing Public Safety with Real...
Join Vantiq for a webinar to learn how constant challenges for cities in general has been reducing the amount of crime and vandalism while also integrating solutions seamlessly with city's existing infrastructure while staying within budget. The City of Opelika has had an immense amount of damage caused to major city equipment that they knew could somehow be prevented. Some of the cost more than up to $75,000 just for a water pump. With V...
Tools for Designing and Assessing Spillways
Join us on October 8, from 12:00 PM - 2:00 PM Eastern for Tools for Designing and Assessing Spillways. Spillways are complex hydraulic structures with materials and geometries that are often tailored to unique site conditions. As such, the analysis associated with the design and assessment of spillways needs to be commensurate with the complexity of the structure and the risk posed by the structure. Some of the complex hydraulic issues often c...
AI Governance: Ensuring Responsible AI...
The recent Executive Order on Artificial Intelligence has established a new standard for the safe, secure, and trustworthy deployment of AI technologies. In response, federal institutions must implement robust governance frameworks to mitigate risks, safeguard privacy, and foster equity. However, the AI landscape is continuously and rapidly evolving, and agencies are encountering complex hurdles that make adopting a trusted AI platform a chall...
VMware Cloud Foundation Tech Day in Pat...
Explore VMware Cloud Foundation (VCF), a ubiquitous hybrid cloud platform for both traditional enterprise and modern applications. VMware Cloud Foundation provides a complete set of software-defined services for compute, storage, network, container and cloud management. The result is agile, reliable, efficient cloud software defined infrastructure that offers consistent operations from garrison to tactical edge. Join us at our upcoming in-pers...
Innovate Cybersecurity Summit
Innovate Cybersecurity Summit is an invitation-only, all-expenses-paid, cybersecurity education event for CISOs and cybersecurity executives. Expert Education Every session is built on direct experience. Every talk is built on specific here-and-now takeaways. Every piece of advice is agnostic of specific tool or technology. Elite Networking We’ve built a meeting place that provides more direct, quiet and valuable access to one of your mo...
October 6-8, 2024
Organizer:
Innovate Location:
Scottsdale, AZ
Zero Trust Architecture (NIST SP 800-207)
In this CPE training event, we overview the principles and implementation of Zero Trust Architecture to enhance your organization's security posture. Zero Trust Architecture, based on the NIST SP 800-207 criteria, revolutionizes the traditional approach to cybersecurity. It challenges the assumption of implicit trust within networks and promotes a model where trust is never granted by default. Instead, it emphasizes continuous analysis and ev...
CMMC Level 2 Implementation
The CPE training event is designed to provide participants with the knowledge and skills necessary to implement the Level 2 practices based on 48 CFR 52.204-21. These practices establish a crucial security foundation for organizations aiming to achieve higher levels of cybersecurity maturity within the CMMC model. It is mandatory for all certified organizations to complete the Level 2 practices. This event should be attended as the CMMC progra...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.