Edge Computing: Bringing Mission from t...
Edge is a strategy to deliver insights and experiences at the moment they're needed. Red Hat can help federal agencies gain near real-time data insights with technologies like automation, containers, Kubernetes and artificial intelligence and machine learning (AI/ML) to meet the speed of relevance. Join us online to match the buzz around "Edge Computing" with the business and technical context necessary and critical to your mission by learning...
Scale Your Cyber Resiliency with Threat...
Anomali has made its mark delivering threat intelligence-powered detection and response with its portfolio of solutions: Match, ThreatStream, and Lens. We've expanded upon that leadership position by introducing The Anomali Platform, a high-performance, big data, cloud-unified threat detection and response solution.Join us on December 7th for a threat intelligence webinar where Mark Alba, Chief Product Officer, and Scott Dowsett, Field CTO of...
MAS Industrial Products and Services Training
Join this virtual meeting for an introduction of the GSA's MAS Industrial Products and Services. In this virtual 1 hour training session you can expect: An introduction of the Industrial Products and Services To have a better understanding of the tool and hardware solutions that are available within MAS as well as how to use the schedule’s Home Improvement Center. Additionally participants will be introduced to the equipment rental secti...
ArcGIS Pro Geospatial Environment with...
ArcGIS is the world's leading Geographic Information System (GIS) software and analytics platform from Esri. Join us to learn how desktop virtualization for ArcGIS Pro with Microsoft's Azure Virtual Desktop can significantly improve performance, maintainability, and reduce costs of your GIS environment.During this webinar, we will cover topics including:The benefits of software virtualization in the cloudHow Azure Virtual Desktop has been used...
Implementing a Zero Trust Architecture...
Agency zero trust policies and strategies are in place. Now it’s all about implementation and defining success. During this exclusive webinar, moderator Jason Miller will discuss zero trust in 2023 and beyond with agency and industry leaders. Learning objectives: Current state of zero trust The pillars of zero trust Measuring success of zero trust strategy
December UiPath & Alpha Omega Integrati...
In this session, attendees will learn about: A multi-disciplinary pragmatic approach required to reduce the time it takes to complete a system going through ATO, or for re-certifying a system Alpha Omega Integration, A2O™ solution built in collaboration with the industry-leading automation vendor UiPath How A2O™ automates The discovery of ATO processes and tasks The collection of data from manual controls Executing controls ...
Protecting Your Identity Attack Surface
94% of organizations have experienced an identity-related breach, making real-time identity threat detection and response a critical strategy for security teams.Regardless of if your users connect from a PC, Mac, or Chromebook (the primary identity store for most schools), Active Directory (AD) represents an especially attractive and vulnerable target for adversaries.Join SentinelOne as we cover:Real-time vulnerability assessment around identi...
Vision 2023: How Digital Transformation...
The state of Texas wants to accelerate the use of next-generation technology to deliver secure digital services. To that end, it has released its 2022-2026 State Strategic Plan for Information Resources Management, which sets four overarching goals: Secure IT service delivery Advanced data management Strategic digital transformation Proactive approach to emerging technologies Just as Texas agencies are looking to modernize and transform their...
December 6, 2022
Organizer:
FEDINSIDER Location:
Austin, TX
Classified Mobility Solutions: Streamli...
Federal defense and civilian organizations responsible for communications acknowledge the critical need to improve mobility and remote work solutions for classified workers. Now, turnkey enterprise-class network solutions combined with industry-leading secure software are delivering the benefits of classified access to warfighters and remote and mobile workers in the field. These systems allow end users to use commercial mobile devices to acce...
FCL-GSA-0023 Basic Contracting for GSA...
Target Audience: Federal Agency and Military This comprehensive training course covers Federal Supply Schedules contracting and ordering procedures. It addresses placing orders against Multiple Award Schedules, as outlined in Federal Acquisition Regulation (FAR) Subpart 8.4. In this course you will learn about the unique flexibility within the GSA Schedules program. This is a four (4) CLP credit course. Note: This webinar satisfies the FAC-C L...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.