Back to Search Begin New Search Save Search Auto-Notify
Cybersecurity & AI
Clearly, cybersecurity is big problem for everyone. Financial service companies, in particular, face a tough task in adhering to compliance frameworks and managing Cybersecurity risks, while at the same time providing services at competitive prices. They need to focus on regulatory frameworks, compliance measures, and technology solutions in response to emergent regulatory and compliance requirements. Recent events have created a movement towa...
April 12, 2018
Organizer: Turtlebay Advisory Services
Location: New York, NY
Add Favorite
Advancing Analytics with Cognitive Situ...
U.S. ground forces handle a massive amount of information and data while working under unpredictable conditions. That means military intelligence analysts don’t always have a technologically reliable way to share and receive information. They must overcome both enterprise communication challenges, which force them to operate for periods with little to no access to data and information overload when connections are available. Join us for...
April 12, 2018
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Inspection and Assessment of Dams
Together Paul Schweiger and Dean Durkee have offered this seminar 13 times in 12 states and it has been attended by more than 800 students. The seminar provides comprehensive instruction in inspection and evaluation techniques for dams. The principles, concepts and procedures taught will be readily adaptable to any organization conducting dam inspections and evaluating their compliance with current design standards. Participants learn about a...
April 10-12, 2018
Organizer: Association of State Dam Safety Officials
Location: Sacramento, CA
Add Favorite
Active Shooter Preparedness Plan
The brutality of armed attacks at work, church, school and elsewhere leaves people speechless, fearful and angry. But you need not feel hopeless. Mass shootings are more common than most people realize. There have been over 571 mass shootings involving the death or injury of four or more people in the past 18 months, according to The New York Times. Join former FBI terrorism expert and corporate security consultant Rob Haley to learn how to pr...
April 11, 2018
Organizer: Avant Resources
Location: Webcast
Add Favorite
Business Continuity Planning Training a...
Every organization needs a business continuity plan to protect its critical operations, resources and services in the event of unexpected disasters and business disruptions. At the time of a disaster everyone in the organization relies on the business continuity plan to ensure continuity of business and to restore normal operating conditions. It is critically essential to build a plan that is reliable, comprehensive, and effective for any busi...
April 9-11, 2018
Organizer: BRCCI
Location: Las Vegas, NV
Add Favorite
FedFocus 2018: Smart Technologies Accel...
Mandated to modernize, Federal agencies are working hard to accelerate IT transformation. Missions are evolving, employee expectations are changing, and emerging technologies bring an opportunity to work smarter, faster, and bolder than ever before. Join us on April 10 at the Newseum to get the inside track on how next-generation technologies are improving the mission of government -- driving efficiency, powering performance, and delivering co...
April 10, 2018
Organizer: MeriTalk
Location: Washington, DC
Add Favorite
The Digital Revolution: Workforce Impact
The promise of government’s digital revolution will come from the use of data to inform decision making and mission delivery. Combining data from the Internet of Things with agency databases is creating the raw materials for real improvement in mission delivery. This webinar will address how employees can benefit from knowledge sharing to use data in new and innovative ways.
April 10, 2018
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Protecting Critical Data from a Cyber Attack
Once an organization is infiltrated, data is usually compromised within hours. The inability to detect an intruder gives hackers time to not only expose confidential information, but also destroy mission-critical data. Could your organization survive an attack? Join this complimentary webinar to explore Dell EMC's Ransomware and Cyber Recovery solution and its advanced protection services to ensure the "heartbeat" of your organization remains...
April 10, 2018
Organizer: Dell EMC Gov Team at Carahsoft Technology Corp
Location: Webcast
Add Favorite
FCL-GSA-0041 GSA Alliant and Alliant Sm...
Governmentwide Acquisition Contracts (GWACs) enable federal agencies to buy cost-effective, innovative solutions for information technology (IT)requirements. Most, if not all, government agencies have a need to buy IT services and solutions. GSA has made this convenient through its GWAC Programs. In this course, you will learn about the Alliant & Alliant Small Business GWAC Program offered through GSA. This is a two (2) CLP credit course....
April 10, 2018
Organizer: GSA
Location: Webcast
Add Favorite
Dell EMC Ransomware & Cyber Recovery Webinar
Protecting Critical Data from a Cyber Attack Date: Tuesday, April 10, 2018Time: 11:00am ET; 8:00am PTDuration: 60 minutesLocation: Online *Register and attend this webinar to receive 1 CPE credit. Once an organization is infiltrated, data is usually compromised within hours. The inability to detect an intruder gives hackers time to not only expose confidential information, but also destroy mission-critical data. Could your organization survive...
April 10, 2018
Organizer: Dell EMC Gov Team at Carahsoft Technology Corp
Location: Webcast
Add Favorite
Back to Search Begin New Search