Selling IT to the Federal Government Tr...
Overview Now more than ever, it is important to understand precisely how the government buys. More vendors are competing for fewer dollars. It’s hard to win if you don’t know the latest rules and processes. This premier learning experience will help you chart a course from opportunity through contract action. In this two-day course, you will learn the actionable tools and techniques to find founded opportunities, position your comp...
Cyviz Tech Day - Remote Systems Managem...
There have been some exciting new updates to how Cyviz enables customers to perform Remote System Management across a wide-variety of video conference rooms with our Display Controller Client/Server Software. In addition, you will want to hear how Cyviz Collaborative Telepresence (CTP) fits together with Microsoft Lync and with Cisco Jabber and Telepresence. Cyviz is the premier manufacturer of CTP solutions. With Cyviz’s CTP, users can...
Advanced Proposal Management
*This is a two-day event that begins at 9:00am and ends at 5:00pm both days This class covers the spectrum of the most important topics, from preparing for a proposal effort and making a bid-no-bid decision, to orchestrating a great proposal kickoff, driving subject matter experts to produce winning content, exhibiting superb leadership and management skills, optimizing proposal team performance, getting the most from the proposal color review...
FY14 Federal Budget Briefings
Join immixGroup's 9th annual Federal Budget Briefings for IT product manufacturers, VARs, and solution providers to gain actionable intelligence on sales opportunities. Get the advantage you need to win new business – despite challenges presented by sequestration. Both the DOD and Civilian Budget Briefing (delivered back-to-back) provide a closer look at the FY14 IT budgets of the top funded federal agencies. Each attendee will receive a...
Introduction to GSA Schedule Contracts
Introduction to GSA Schedule Contracts Government agencies spend nearly $40 billion annually through the GSA Schedule Contract vehicle. Join us for this complimentary webinar to learn how the GSA Schedule Contract facilitates government sales and what steps your company must take to obtain the contract. Topics to Include: General Services Administration - Who, What and Why? GSA Schedule Contracts - A Brief History Who is Eligible to Purchase F...
POSTPONED Nuclear Regulatory Commission...
This event has been postponed due to the shutdown. We hope to have a rescheduled date soon. In recognition of Cyber Security Awareness Month, the Nuclear Regulatory Commission is hosting a Cyber Security Conference in Rockville Maryland during October of 2013. This 1-Day conference will consist of Cyber Sessions in the NRC Auditorium given by government and industry speakers. Exhibit tables will be set-up just outside the Auditorium and compan...
Strategies for Effective Business Conti...
Live Webinar Presented by McAfee Foundstone With the number of events around the globe that affect businesses and information centers, the need for business continuity and disaster recovery planning is evident. While major business continuity concerns do not always arise on a daily basis, it is important to prepare for the day a disruption will occur. Join us for a live webinar to learn how McAfee Foundstone's Business Continuity Management ca...
Cybersecurity Symposium
CANCELED
Cybersecurity Symposium – Protect. Defend. Educate October 16 & 17, 2013 To support National Cyber Security Awareness Month, the Industrial Security Awareness Council of Central Maryland (ISAC-MD) is sponsoring a Cybersecurity Symposium “Protect. Defend. Educate” on October 16-17, 2013 at the BWI Marriott in Linthicum, Maryland. President Obama declared that the "cyber threat is one of the most serious economic and nation...
Dealing with Modern Malware - Protectio...
CANCELED
Live Webinar Presented by Palo Alto Networks and Spear Your network is facing a rapidly evolving threat landscape full of modern applications, exploits, malware, and attack strategies that are capable of avoiding traditional methods of detection. Threats are delivered via applications that dynamically hop ports, use non-standard ports, tunnel within other applications, or hide within proxies, SSL, or other types of encryption. Learn how Palo A...
Brocade October Partner Training ...
Join this interactive event to find out how you can: Leverage Brocade networking solutions to grow your pipeline and help exceed your sales goals Capitalize on opportunities within Civilian agencies Develop an optimal solution for your customer Following an Ethernet fabrics presentation, there will be an interactive panel discussion hosted by a partner representative. The panel will share best practices and first-hand Federal success stories....
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.