True Cybercrime Stories
Join Trustwave on Wednesday, September 2nd for a live webinar. Whether you are a twenty-year veteran or have just started your journey into the world of cybersecurity, you will find this remarkable event entertaining and very beneficial. We have assembled a small handful of interesting, real-world cybercrime stories told by actual cyber investigators. Each story a cautionary tale on a grand scale!
FAR Part 37- Service Contracting
This part prescribes policy and procedures that are specific to the acquisition and management of services by contract. This part applies to all contracts and orders for services regardless of the contract type or kind of service being acquired, including performance-based acquisitions.
GSA Schedule - Completing The Proposal
Join JSchaus & Associates (Washington DC based consulting firm) for our 2020 webinar series. Webinars are RECORDED and COMPLIMENTARY. Check our YouTube channel or website for the upcoming schedule and previous recordings. Contact us for help with your federal procurement needs including market analysis, SBA 8a Cert, GSA Schedules, pricing, proposal writing, sales & business development, contract administration and more. Thank you for r...
Standoff Facial Recognition from UAVs,...
Security forces personnel are required to accomplish hundreds of hours of training each year to accomplish the mission of providing integrated defense and military law enforcement for the base, while developing highly-trained security forces Airmen to support deployed contingency operations. Whether this training entails guarding assets, controlling entry to the installation, increasing security for a distinguished visitor, or a construction p...
Enhance Collaboration Experiences for P...
Adobe Sign enables agencies to cut the cost and hassle of manual, paper-based tasks by reducing the back-and-forth that typically accompanies document review and approval processes – providing users with more control and visibility over all document workflows. As Microsoft’s preferred e-signature solution, Adobe Sign works right from the Microsoft tab interface, so you can quickly and securely sign and send documents, contracts, an...
Boost and Monitor Remote Worker Product...
Join Carahsoft & ISEC7 to learn how to monitor and increase remote worker productivity through digital transformation with VMware End User Computing (EUC) and ISEC7 solutions. Organizations around the world are in the process of digital transformation - integrating digital technology into all areas of business and fundamentally changing operations. While shifting towards a totally digital workplace may seem like a daunting task, it ultimat...
Modernizing DoD's Approach to Security...
The Department of Defense (DoD) is considering how to best leverage zero trust architecture (ZTA) to move away from the traditional network-centric security model. By shifting to a modern, resource-centric framework, agencies are better able to focus on protecting data and critical resources. During this webcast, we’ll explore how a cloud service provider, such as Zscaler, can help transform the DoD's existing cybersecurity platform with...
FAR Part 38- Federal Supply Schedule Co...
This part prescribes policies and procedures for contracting for supplies and services under the Federal Supply Schedule program, which is directed and managed by the General Services Administration.
How the Lonestar State is Leveraging Di...
More than 1,300 local, state and federal organizations use DocuSign to enable citizens, businesses, and staff to work smarter and more effectively with self-service forms, electronic signatures, prepopulated agreements, and automated approval processes. Join your peers and other leaders in Texas to see how you can transform your agreement process by eliminating paper, automating workflows, and connecting the systems within your organization. T...
Leverage Data Processing at the Edge fo...
Artificial intelligence (AI) and machine learning (ML) are becoming increasingly mission critical as the volume, variety, and velocity of data exceeds the cognitive capabilities of human operators. Join AI/ML experts from Red Hat and HPE as they discuss how to enable AI/ML as an effective real-time mission partner with their collaborative solution that makes AI-driven edge processing a reality. Data-driven applications like AI/ML must not be c...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.