Leveraging NASPO for Continuous Situati...
Lead time is critical when responding to public safety emergencies. Decision-makers need clarity and context as an event unfolds to effectively manage their operations to bolster first response, transportation, infrastructure protection and emergency management. Artificial intelligence can help deliver reliable, relevant, real-time information for public sector organizations to protect the people and communities they serve by providing them wi...
Prophecy Phishing Attacks Managed Webinar
During this webinar, participants will experience and hear about:A simulated Phishing Scheme showing how an attacker can gain access to secure internal systems by posing as a trusted contractorDiscussion on Attacker’s Perspective and Victim’s Perspective through a life-like simulationStolen credentials, breach methods and contractor mistakes and how they further the lifespan of security breachesSuspicion and Detection techniques th...
Defense One Tech Summit
Technology is reshaping the future of war, from undersea to outer space, and more than ever, commercial companies are shaping technological trends. We'll explore how recent developments in artificial intelligence have upended expectations for AI-powered tools, and how the Pentagon continues to press for advances in a dozen emerging technology areas. Join Defense One’s 9th Annual Tech Summit to learn how innovations of today and tomorrow...
June 18, 2024
Organizer:
Defense One Location:
Arlington, VA
Carahsoft DevSecOps Conference
We are thrilled to announce the upcoming second annual DevSecOps Conference! This year's event promises to be even more exciting and insightful, with an agenda packed full of government panels, engaging sessions and thought-provoking discussions on the latest trends and challenges in DevSecOps. Here's what you can expect at the conference: Government Panels: Gain unique insights from government experts as they discuss the evolving land...
Qlik Public Sector Summit
Join us for a day full of discussions on everything data integration, quality and analytics, and AI for U.S. Federal, and State and Local government agencies, as well as K-12 and Higher Education organizations. We’re crafting the agenda as we speak, but this year you will hear from: Qlik’s CEO and Vice President of Federal Executives from the Defense Logistics Agency, the United States Coast Guard and the Department of Veterans Aff...
June 18, 2024
Organizer:
Qlik Location:
Washington, DC
How to Defend Your Expanding Attack Surface
There are plenty of benefits to innovative new technologies, from greater efficiency to cost savings to customer satisfaction. It is rare, however, for a new technology to truly replace existing IT – rather, it gets incorporated into or bolted onto current systems. This approach, along with the explosion of mobile devices and proliferation of software and SaaS applications, dramatically increases and clouds an Agency’s cyber footpr...
June 18, 2024
Organizer:
FedInsider Location:
Webcast
Personal Property Abandonment & Destruction
Come learn about the Abandonment & Destruction of Personal Property directly from Federal Management Regulation (FMR) 102.36. This training will provide you with information as to what kind of property you can consider for abandonment and destruction, what are the rules, under what conditions, and when you should consider taking such action. You will also learn the two questions that you may ask prior to considering this task. This class p...
VETS 2 DPA Training
Who Should Attend: All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how the VETS 2 GWAC can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against the VETS 2 GW...
Decoding Digitalization Defense: Friend...
The adoption and implementation of digitalisation is well underway in most of society, with defence organisations at various stages of the transition. However, are any of them losing out due to the speed of adoption? Given the “new normal” in warfare we are witnessing in Ukraine, what is their plan to create and maintain information superiority without digitalisation? Defence agencies’ traditional working practices are battle...
Anchore VIPERR Workshop
Developing concrete processes and controls to secure your organization's software supply chain can absorb massive amounts of time and resources without guaranteeing significant security improvements. Enter VIPERR, an actionable software supply chain security framework developed by Anchore, synthesizing lessons learned from supporting the most challenging software supply chains across government agencies and the defense industrial base. Join An...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.