Certificate of Cloud Security Knowledge...
Certificate of Cloud Security Knowledge v5 | Lectures and Labs Get Certified in Cloud Security with CCSK v5 Plus Certification Training Advance your career and strengthen your cloud security expertise with CCSK Certification Training—a globally recognized certification from the Cloud Security Alliance (CSA). Our comprehensive CCSK v5 Plus Training course fully prepares you for the Certificate of Cloud Security Knowledge (CCSK) exam with...
Discover How to Operationalize Your Hea...
Healthcare organizations are turning rich clinical data into high-value research assets and new revenue streams. This webinar will explore how a structured data strategy can unlock that value—through external licensing, internal research and population health initiatives—while ensuring compliance and impact. Join us as we share real-world examples and walk through the key steps to operationalize this approach, from automated de-ide...
From Zero to Hero: Mastering Tableau wi...
Join us and upgrade your Tableau design skills. Whether you're just starting out or have been creating dashboards for years, Chris Cox and Heather Ditillo will share their wisdom and tips for all levels. During this webinar, attendees will learn:How to navigate and use Tableau templates and skins to expedite development and wow audiencesDesign best practices, including when to use which visualization and the anatomy of a dashboardHow to utiliz...
Achieving Decision Dominance in a Multi...
Thank you for your interest – registration for the Everfox, Dell and Carahsoft event has closed as the event has been postponed to a TBA date later in the year. Everfox, Dell Technologies and Carahsoft invite you to join us at the Ritz-Carlton in Washington, DC, on July 15th from 1pm to 4pm ET as we explore the challenges of ‘Achieving Decision Dominance’. Decision Dominance within Government can be achieved through fostering...
The Definitive Red Hat Enterprise Linux...
Join Red Hat for an in-person workshop in Reston, VA to get hands-on with Red Hat Enterprise Linux 10 (RHEL 10), the most advanced release yet. Flipp Bunts, our featured trainer, has over 20 years of experience in designing highly-available Linux clusters and is know for his work in architecting classified networks, implementing continuous monitoring and migrating legacy Unix systems to Linux. During this training, Flipp will take the stage to...
Getting to Continuous Authorization to...
One of the most beneficial practices any agency can implement is achieving and maintaining Continuous Authorization to Operate (cATO). It allows an organization to maintain ongoing authorization for their systems and software, rather than having to obtain a one-time ATO for each deployment. Gaining a cATO requires agencies to implement continuous monitoring of the security of their systems and practicing active cyber defense measures that proa...
July 15, 2025
Organizer:
FedInsider Location:
Webcast
VETS 2 DPA Training
Who Should Attend:All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how the VETS 2 GWAC can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against the VETS 2 GWA...
The Impact of AI on Finance, Internal A...
Join the EY Center for Board Matters on Tuesday, July 15, 2025, at 3:00 p.m. (ET) for another episode in our webcast series, Better Questions for Boards, designed to provide directors with insights and questions to consider as they engage with management on a variety of complex boardroom issues. AI technologies are surging and evolving, presenting both risks and opportunities for companies. Boards and particularly audit committees are keenly f...
July 15, 2025
Organizer:
EY Location:
Webcast
Quantum Leap: Securing Federal Systems...
The threat of "harvest now, decrypt later" attacks is no longer a distant concern—it's a pressing reality for federal and defense agencies. The urgent need to migrate to post-quantum cryptography (PQC) standards has never been clearer. In this virtual session, we will:Explore the collaboration between NIST and the cybersecurity industry through the NCCoE.Discover how agencies can rapidly adopt cryptographic inventory solutions and PQC-en...
Modernizing the Workforce for Mission s...
As agencies look to increase efficiency and accountability, the modernization of back-office systems—like HR, performance management and administrative tools—has become a top priority. This webinar will explore how federal leaders are using emerging technologies like AI and automation to streamline operations, reduce low-value work and better manage data for improved decision-making and oversight. Key Topics:Modernizing HR and admi...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.