Business Continuity Planning Training a...
Every organization needs a business continuity plan to protect its critical operations, resources and services in the event of unexpected disasters and business disruptions. At the time of a disaster everyone in the organization relies on the business continuity plan to ensure continuity of business and to restore normal operating conditions. It is critically essential to build a plan that is reliable, comprehensive, and effective for any busi...
April 9-11, 2018
Organizer:
BRCCI Location:
Las Vegas, NV
FedFocus 2018: Smart Technologies Accel...
Mandated to modernize, Federal agencies are working hard to accelerate IT transformation. Missions are evolving, employee expectations are changing, and emerging technologies bring an opportunity to work smarter, faster, and bolder than ever before. Join us on April 10 at the Newseum to get the inside track on how next-generation technologies are improving the mission of government -- driving efficiency, powering performance, and delivering co...
April 10, 2018
Organizer:
MeriTalk Location:
Washington, DC
The Digital Revolution: Workforce Impact
The promise of government’s digital revolution will come from the use of data to inform decision making and mission delivery. Combining data from the Internet of Things with agency databases is creating the raw materials for real improvement in mission delivery. This webinar will address how employees can benefit from knowledge sharing to use data in new and innovative ways.
April 10, 2018
Organizer:
FEDINSIDER Location:
Webcast
Protecting Critical Data from a Cyber Attack
Once an organization is infiltrated, data is usually compromised within hours. The inability to detect an intruder gives hackers time to not only expose confidential information, but also destroy mission-critical data. Could your organization survive an attack? Join this complimentary webinar to explore Dell EMC's Ransomware and Cyber Recovery solution and its advanced protection services to ensure the "heartbeat" of your organization remains...
FCL-GSA-0041 GSA Alliant and Alliant Sm...
Governmentwide Acquisition Contracts (GWACs) enable federal agencies to buy cost-effective, innovative solutions for information technology (IT)requirements. Most, if not all, government agencies have a need to buy IT services and solutions. GSA has made this convenient through its GWAC Programs. In this course, you will learn about the Alliant & Alliant Small Business GWAC Program offered through GSA. This is a two (2) CLP credit course....
April 10, 2018
Organizer:
GSA Location:
Webcast
Dell EMC Ransomware & Cyber Recovery Webinar
Protecting Critical Data from a Cyber Attack Date: Tuesday, April 10, 2018Time: 11:00am ET; 8:00am PTDuration: 60 minutesLocation: Online *Register and attend this webinar to receive 1 CPE credit. Once an organization is infiltrated, data is usually compromised within hours. The inability to detect an intruder gives hackers time to not only expose confidential information, but also destroy mission-critical data. Could your organization survive...
SANS 2018
SANS is returning to Orlando for one of our largest events of the year: SANS 2018! Please join us April 3-10, and choose from over 45 information security courses. SANS courses are comprehensive and engaging, offering you hands-on training with actionable information you can implement immediately upon returning to work. Our courseware is based on real-world threats and situations from industry experts with practical experience in the field, ma...
Western Grants Forum: OMB Super Circula...
Learn how to better manage your Federal grants and subawards during the 2018 Western Grants Forum: Super Circular Training & Cost Principles Deep Dive. The Uniform Grants Guidance (a.k.a. the Omnicircular or Super Circular) has detailed rules, including cost principles, that govern how grant funds are to be managed and spent. Failure to follow the Super Circular's requirements can lead to enforcement actions, ranging from disallowances and...
IT Modernization Summit
Legacy systems cripple federal agencies. They hamstring innovation, leave information vulnerable to bad actors, cost more and more to maintain as they age, and push away talented personnel who want to work with the latest technology. The White House and Congress have made major steps of late, though, to bring agencies into the 21st century, releasing major IT modernization policy and providing funding to jumpstart a governmentwide tech refresh...
April 5, 2018
Organizer:
FedScoop Location:
Washington, DC
F5 Government Technology Symposium
Federal Agencies are under ever increasing pressure to meet the Cloud First mandate and still maintain their security and regulatory compliance postures. Complicating matters even further, the 2017 Verizon Data breach report highlighted that 62% of the breaches involved application level hacking, and 81% of the hacking incidents involved weak or stolen passwords. This evolving combination of attack vectors makes cloud based applications a part...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.