Back to Search Begin New Search Save Search Auto-Notify
Move Your In-Person Events Online
If you're planning to cancel your upcoming events due to unforeseeable circumstances, consider instead the convenience of moving your event online. With virtual events, you can take advantage of all the same features and functionality you would have had before without risk to participant and while cutting travel and costs. Register now for this complimentary webinar and learn best practices from the experts who have successfully executed virtu...
Add Favorite
Adobe ColdFusion for the Next Decade: A...
Right from its inception, Adobe ColdFusion has successfully pivoted and adapted at regular intervals - making it a progressive, reliable, and successful platform for the current and future landscape of the web application industry. With very few technologies managing to stay in the game for so long, there is plenty for the Adobe ColdFusion community to be proud of and look ahead to!Join our complimentary webinar for a sneak peak of the much an...
Add Favorite
FAR Part 12- Acquisition of Commercial Items
This part prescribes policies and procedures unique to the acquisition of commercial items and implements the Federal Government’s preference for the acquisition of commercial items, which is to be achieved by establishing acquisition policies that more closely reflect those of the commercial market.
Add Favorite
COVID - 19 Virus And The Federal Govern...
Hear from legal experts, public affairs specialist, finance and banking professionals and more about the impact to the federal contracting.
Add Favorite
The Virtual Workforce: Technology Strat...
Given the recent surge in enabling employees to work from home, many organizations are unprepared to create a productive, secure, and reliable telework environment. Understanding how to support a culture of virtual work is a significant shift for many enterprises who expect their employees to come in every day. The truth is, though, when an emergency strikes such as COVID-19, organizations need to be ready for Plan B. Continuity of operations...
Add Favorite
Web Series: Demystifying Cyber Threat H...
Traditional cybersecurity practices are failing to detect threats that exist in the gaps of networks and cyber teams. Cyber tools are only alerting us to what we know, but do not indicate new security risks unique to individual agencies. With threat hunting, security risks can be identified throughout the entire network revealing gaps in your agency's security that common cyber tools miss.Join CybernetIQ and Carahsoft for our web series to div...
Add Favorite
Keeper Defending U.S. Government Agencies
Cybersecurity starts with password security. 81% of all data breaches are due to weak password security. How can we prevent these breaches while quickly and cost-effectively closing the largest security gap in government agencies? The answer is with strong password policies, enforced by an easy-to-use, intuitive password security solution. Join Keeper for a webinar on March 24th to learn how to best protect your agency. During this webinar, Da...
Add Favorite
The Bid Protest Process - What You Need...
Join JSchaus & Associates (Washington DC based consulting firm) for our 2020 webinar series. Webinars are RECORDED and COMPLIMENTARY. Check our YouTube channel or website for the upcoming schedule and previous recordings. Contact us for help with your federal procurement needs including market analysis, SBA 8a Cert, GSA Schedules, pricing, proposal writing, sales & business development, contract administration and more. Thank you for r...
Add Favorite
Making Learning Secured
Continuously training your workforce is vital to upgrading their skills and pushing your agency forward. To do that, you need a learning management system (LMS) built for your government trainees. Adobe Captivate Prime is an award-winning, cloud-based LMS that delivers an enhanced learning experience for your government learners. We are excited to announce that Adobe Captivate Prime is now FedRAMP certified to provide a secure learning enviro...
Add Favorite
FedRAMP Webinar
Government agencies strive to secure and modernize critical systems from cybersecurity threats and insider threats. Email is by far the most frequent and prolific source of advanced attacks - more than 90% of advanced attacks start with email. Threat actors continue to adapt tools and techniques across attack types to exploit a range of vulnerabilities, including social engineering to trick people into clicking on malicious attachments or URLs...
Add Favorite
Back to Search Begin New Search