Back to Search Begin New Search Save Search Auto-Notify
Doing Business with the Navy
The Navy relies on a variety of technologies and platforms to project U.S. power around the world, such as aircraft carriers, destroyers, submarines and other combat vessels. Tying all of these platforms together are IT systems. Relying on command-and-control systems, telecommunications, intelligence, satellites, and other IT systems is how the Navy ensures it successfully completes its mission. Because of this, the Navy has often been at the...
March 8, 2024
Organizer: Washington Technology
Location: Reston, VA
Add Favorite
HEC-RAS
This course provides an introduction of HEC-RAS with applications to dam safety. The course provides a hands-on opportunity to use the program and resolve specific questions. The objective of this course is to review the basic principles of open channel hydraulics as they relate to the natural stream environment with application to dam safety. Bridges, culverts, and in-line structures will be discussed and both steady and unsteady flow modelin...
March 5-8, 2024
Organizer: Association of State Dam Safety Officials
Location: Virtual
Add Favorite
San Diego Cyber Security Summit
The Fourth Annual San Diego Cybersecurity Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission gives you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
March 7, 2024
Organizer: The Official Cyber Security Summit
Location: San Diego, CA
Add Favorite
Climbing the Mountain: A New Era for Go...
In an era where cyber threats are increasingly sophisticated, the need for robust cybersecurity strategies in government IT departments is more pressing than ever. These threats are continuously evolving, leveraging new technologies and exploiting vulnerabilities in innovative ways. As a result, there is an urgent need for IT sectors to adapt and enhance their cybersecurity strategies. This adaptation isn’t just about implementing new te...
March 7, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Overcoming Legacy Infrastructure Throug...
Educational institutions and state and local agencies historically have been challenged to keep up with technological advancements – their budgets are tight, their users are increasingly distributed post-pandemic, and they face significant operating expenses from maintaining legacy architectures and equipment. Digital transformation is appealing, but for many organizations the challenge is where to start. As the generation of data has ex...
March 7, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Cyber Defenders Workshop
Cybersecurity is a cornerstone of the Biden administration’s priorities and has never been more important to securing the nation’s infrastructure and data from cyber threats than it is today. Government IT leaders must remain vigilant against near-constant cyber threats while maintaining legacy systems and securing a remote workforce. In this workshop, Nextgov/FCW will examine the most important trends in cybersecurity across the f...
March 7, 2024
Organizer: GovExec 360
Location: Virtual
Add Favorite
Third-Party Risk Management: It's Time...
The gap is widening. Your Third-Party Risk Management (TPRM) challenges aren't getting any easier—onboarding still takes too long; you have a backlog of assessment work; and you're not covering as much of your vendor portfolio as you know you should. There are more vendors every day and there is more work to do, yet your TPRM resources have stayed relatively flat. It's impossible to keep up. It doesn't have to be that way. Forward-thinki...
March 7, 2024
Organizer: ISACA
Location: Webcast
Add Favorite
Simplify, Automate and Secure Your DNS...
You are invited to Infoblox's California DNS Security Workshop. With interactive presentations and demonstrations, we will discuss strategies and best practices for optimizing your DNS strategy. Infoblox continues to strive to stay connected with you, our valued customers. This event is designed for IT professionals who are responsible for Networking and Security within their organizations as the content of this session will help both teams un...
March 7, 2024
Organizer: Infoblox Government Team at Carahsoft
Location: Sacramento, CA
Add Favorite
Forensics in the CISA Incident Response...
The Cybersecurity and Infrastructure Incident Response and Vulnerability playbook released by the Cybersecurity and Infrastructure Security Agency (CISA) in November 2021 lays out a detailed plan for how agencies should implement communication, technology, and policy for Incident response. Forensic collection, preservation, analysis, and reporting are important parts of this playbook. This presentation will discuss the Incident Response playbo...
March 7, 2024
Organizer: Digital Government Institute
Location: Webcast
Add Favorite
Personal Property Abandonment & Destruction
Come learn about the Abandonment & Destruction of Personal Property directly from Federal Management Regulation (FMR) 102.36. This training will provide you with information as to what kind of property you can consider for abandonment and destruction, what are the rules, under what conditions, and when you should consider taking such action. You will also learn the two questions that you may ask prior to considering this task. This class p...
March 7, 2024
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Back to Search Begin New Search