Federal Procurement and Contracting Ess...
To sell productively to the government, you and your team must understand its unique requirements and buying processes. What do contracting officers care about? How do they make decisions on which contracting methods and vehicles to use when making IT purchases? What is your role in this process? This intensive one-day course: Defines the various contracting methods and types used in IT procurements Discusses strategies to acquire and/or acces...
Fundamentals of Selling Technology to t...
To succeed in a government sales career, you must understand how the federal customer does business and how to best position yourself to capture it. This interactive one-day training provides you with the foundational background, actionable tools, and techniques you need to succeed. This class will help you: Understand how federal agencies operate and the government trends shaping their technology needs Navigate federal IT budget documents to...
Advanced Information Assurance for Elec...
This lunch and learn event is provided on behalf of Stonesoft. Network security is often described as the intersection of confidentiality, integrity, and availability. Yet most information assurance products focus on only one or two of the three. In this talk, join Stonesoft and immixGroup to learn about strategies that can comprehensively address all three for Electronic Health Records (EHR) initiatives. Join us for a briefing at Stonesoft HQ...
Free Webinar: Heeding The Call for Reco...
Heeding The Call for Records Management Reform:How The President's Initiative Will Change How We Manage Records Today at2pm ET|11am PT Records Management in Agencies across the board will see a major paradigm shift in 2012 in the wake of President Obama's Memorandum on Managing Government Records. Join Feith Systems this TODAY at 2pm ET as we present a round table with the Feith Government Records Management Team in this critical new webinar w...
Secure Remote Support for the Mobile Agency
This complimentary online webinar is provided on behalf of Bomgar. Agencies have used remote access to support their employees for decades. However, the point-to-point solutions first used to support the LAN have failed to address key security requirements of an Internet-centric world. In fact, for several years, remote access has been found to be the leading attack pathway for hackers – in some studies, implicated in more data breaches...
Database Breaches - Are Your Customers...
This complimentary online webinar is provided on behalf of McAfee. Recent studies conducted by both Verizon Business and Forrester Research indicate that 15% of enterprises and government agencies do not employ any security measures to protect the data residing in their databases. Additionally, more than 70% of enterprises and government agencies do not, or cannot, patch their databases, leaving them vulnerable to attacks. Learn how to help yo...
A Closer Look at Applying Commercial Lo...
This complimentary online webinar is provided on behalf of Progress Software. It is a daunting task to stay informed and in control of every stage of the supply chain. Supply chains are becoming more complex due to the globalization of suppliers and consumers. It is important to have online visibility into any supply chain issues/disruptions and the ability to perform real-time collaboration with suppliers and partners. You must also be able t...
Fort Hood Technology Expo
The semi-annual Fort Hood Technology Exposition will be taking place on Friday, January 27, 2012 at the Phantom Warrior Center. The expo is free and open for all personnel to attend. More than 200 attendees are expected to attend this year's expo with the following organizations being represented: * III Corps * 1st Armored Division West * 1st Calvary Division * 120th Infantry Brigade * 1st Medical Brigade * 13 Sustainment Command * 21st Calvar...
Degauss It or Risk It Webinar on Data D...
Join us for a Webinar on January 26! Attend our FREE webinar to learn more about the technology used by the FBI, NSA and CIA to quickly and safely destroy sensitive data. Hard drives and data tapes store your secrets: sensitive data you would not want to fall into the wrong hands. Our state-of-the-art degausser can kill up to 1,800 hard drives or tapes an hour. It is so powerful, it meets tough National Security Agency and Department of Defen...
AFISR at Security Hill Technology Expo
The semi-annual AFISR Security Hill Technology Exposition will be taking place on Thursday, January 26, 2012 at the Kisling Community Center. Hosted by the Air Force Intelligence Surveillance and Reconnaissance Agency/A6, the expo is free and open for all personnel to attend. More than 300 attendees are expected to attend this year's expo with the following organizations being represented: * AF IOC * AFISR * 37th Training Wing * 59th Medical W...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.