Maintenance Repair Facility Supplies (M...
Federal agencies now have a fast, effective way to buy maintenance, repair and facility (MRFS) supplies and save! GSA’s dynamic MRFS purchasing channel solution can help you save an average of 8 percent more on MRFS products than previously offered in the federal marketplace. Log on for live webinar training to discover the benefits of GSA’s MRFS solution. Seize your opportunity to attend this short, in-depth webinar, for which you...
Federal Ready - Built by Permuta
Permuta's FederalReady is a tool for organizing and tracking information by integrating numerous, disparate data sources within the organization, as well as outside systems, as required. Its out-of-the-box, interconnected, and reliable design provides a highly effective way to track pertinent information about personnel, assets, and force readiness.Join our complimentary webinar to learn about how FederalReady supports dynamic reporting functi...
Enhance Your Creativity with Power and...
At this year's Adobe MAX Creativity Conference, guests got an inside scoop into the future of Adobe Creative Cloud through dazzling demonstrations and live presentations covering a variety of new releases and useful updates to many already loved products. Join our complimentary webinar as we take a deeper dive into how the public sector and its creatives can integrate vital upgrades and cross-platform solutions into exist workflows, making it...
Data Protection Transformed with Zscaler
Every day ransomware, data breaches, and careless user behavior put your organization's data in harm's way. Unfortunately, today's legacy approaches just aren't built to deliver the holistic intelligence needed to secure your data across all threat vectors. Join Zscaler and Carahsoft on Wednesday, November 16th for a webinar to learn how Zscaler's Zero Trust Exchange has evolved to solve today's most difficult data protection challenges throug...
CX Summit 2022 - Operationalizing the P...
Over the past year, the Biden-Harris Administration has increased the focus on improving federal services through the President’s Management Agenda which presented a roadmap for ensuring an equitable, effective, and accountable Federal Government that delivers results for all. The three priorities were: Strengthening and empowering the Federal workforce; Delivering excellent, equitable, and secure Federal services and customer experience...
November 15, 2022
Organizer:
ACT-IAC Location:
Washington, DC
Google Government Summit - Washington, DC
Government Summit - Washington DC Join the Google Government Summit to learn how technology is helping government leaders achieve mission outcomes and unleash human potential.Google Public Sector is bringing together government and industry leaders from federal, state, and local government from the United States and around the world. Speakers include Jeanette Manfra, MK Palmore, Thomas Kurian and others.Request a spot in person for the full da...
November 15, 2022
Organizer:
Google Cloud Location:
Washington, DC
VETS 2 DPA Training
Who Should Attend: All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how the VETS 2 GWAC can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against the VETS 2 GW...
Cyber-SCRM Educational Training Series
You are invited to join the Cybersecurity Supply Chain Risk Management (C-SCRM) Acquisition Community of Practice (ACoP). Since the launch of the C-SCRM ACoP, GSA and CISA have been co-leading an effort to broaden the level of awareness and develop agency maturity in the areas of acquisitions, supply chain risk management, and cybersecurity across the Federal Government for information communication technology and services (ICTS). Why Should Y...
Keeping the Government Workforce Produc...
The hybrid workforce and direct-to-app architectures have rendered legacy security architectures obsolete while dramatically increasing our attack surface. Cloud based security with ZTNA 1.0 approaches have emerged as potential solutions, but they only solve part of the problem, failing to adequately secure today's work-from-anywhere users and direct-to-app architectures.This session will explain a modern approach to ZTNA and how it is imperat...
Security Programs That Thrive in Econom...
With economic conditions causing concerns, many security teams with limited resources are sacrificing security initiatives for cost containment. All while expanding attack surfaces are requiring more time and attention than ever before. If this problem sounds familiar, join us to learn how managed detection and response solutions, integrated with existing security investments, can more quickly establish an acceptable ROI while dramatically re...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.