Introduction to Google Cloud Differenti...
Training for decision-makers, IT business leaders, and program managers, to learn more about Google Cloud cloud technology and digital transformation, Google’s global network, role of data in digital transformation, infrastructure and application modernization, and Google Cloud solutions. We will also provide an overview of our air-gapped private cloud solution for regulated customers, Google Distributed Cloud Hosted.
Digital Innovation for Crisis Management
Join us for a thought-provoking session where we take you through a live demo of ABHS and explore the current state of mental health in Canada. You will learn the benefits of a behavioral health solution and walk-through a case study where we implemented ABHS for the State of Michigan. Features of our solution include:Omnichannel CommunicationEnhanced Care CoordinationData IntegrationCommunity Support Networks
Tanium + Elastic GenAI Security Workshop
Join us on October 8 in Olympia, Washington for an in-person Tanium + Elastic GenAI Security Workshop! During this event, key topics that will be discussed include how GenAI can help solve real-world problems such as: Identifying and mitigating zero-day threats Detecting sophisticated ransomware attacks Responding to breaches in real-time
Tax Planning with Ed Zurndorfer
An Overview of How Federal Benefits are TaxedFERS AnnuityCSRS AnnuityTSP Withdrawals from both Traditional and Roth TSP accountsSurvivor BenefitsEd reviews how the IRS treats each of these items for Federal Employees. Other Tax Planning Topics to ConsiderThe taxation of Social Security Benefits, how much the state you live in impacts your net amount of income, and which states have the highest and lowest property tax rates The 2017 Tax LawHow...
AI Governance: Ensuring Responsible AI...
The recent Executive Order on Artificial Intelligence has established a new standard for the safe, secure, and trustworthy deployment of AI technologies. In response, federal institutions must implement robust governance frameworks to mitigate risks, safeguard privacy, and foster equity. However, the AI landscape is continuously and rapidly evolving, and agencies are encountering complex hurdles that make adopting a trusted AI platform a chall...
Preparing for Your Crypto Future: Marke...
From the Pentagon to boots-on-ground, cloud computing is driving actionable, data driven decisions that keep our nation safe. Effective data analytics require edge to cloud data collection as well as cloud to edge data dissemination. The secure transport of this data over disparate networks is driving interdependencies between data links over secure Layer 3 using High Assurance IP Encryption (HAIPE) and secure Layer 2 using Ethernet Data Encry...
Securing the Future: Protecting State a...
State and local governments are increasingly embracing technology to modernize how they plan, build and manage critical infrastructure. While digital transformation brings efficiencies, it also introduces new cybersecurity risks. Outages, breaches and cyberattacks can disrupt projects, lead to financial losses and damage public trust. Join Government Technology, GuideHouse, and Kahua on Oct. 8, 2024, at 11 AM PT/ 2 PM ET for a live webinar on...
8(a) STARS III GWAC DPA Training
This course provides Delegation of Procurement Authority Training for GSA's 8(a) STARS III Governmentwide Acquisition Contract (GWAC) for IT services. The training defines GSA GWACs, identifies the features and benefits of the 8(a) STARS III GWAC, provides an understanding of 8(a) STARS III ordering procedures and outlines responsibilities of ordering contracting officers. Please note: This training is limited to Federal/Military personnel. Co...
Anatomy of a Ransomware Attack: Protect...
Ransomware attacks are becoming alarmingly frequent and sophisticated. They pose severe risks to healthcare providers by compromising patient data, disrupting critical services, and imposing substantial financial burdens. According to data from the Zscaler ThreatLabz 2024 Ransomware Report, healthcare was a prime target of ransomware attacks throughout 2023 and into 2024, seeing a 126% increase year-over-year in the number of attacks. Understa...
South-East CMMC (SEC) Conference
The Cybersecurity Maturity Model Certification (CMMC) first began its journey back in 2019. After long delays, lack of formal communications by the U.S. Government, and overall fatigue by industry on the topic of CMMC, many businesses remain unready to meet contractual obligations as defined by the FAR and DFARS. As of August 2024, the CMMC rule has now been fully vetted by the U.S. Government and is slated for adoption in CFR 32 and 48 this O...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.