347 past events found
Back to Search Begin New Search Save Search Auto-Notify
Crush Your Government Contracting Sales Goals
The federal government is the world’s Fortune One Customer- it buys more than any other entity in the world. Over $450 billion is spent every year with small, medium and large companies selling every service and product imaginable. With that rich of a market, is it easy to reach sales goals? No! A newly-released third party sales benchmark study by a national organization determined: Only 7% of companies and salespeople exceed their sale...
Add Favorite
How to Catch Advanced Persistent Threat...
Join Dr. Richard T. White and Robert D. Long of Tennessee Department of Transportation's Cyber Security Team on how they secure of the Top 5 highway systems in the U.S. against advanced persistent threats (APTs) and ransomware attacks. Richard and Robert will be interviewed by Val Bercovici, CEO and co-founder of Chainkit about the their new architecture and highlights published in their new technical paper: Secure Connectivity for Intelligent...
Add Favorite
How to Catch Advanced Persistent Threat...
View this on-demand webinar to hear Richard White, Cyber Security Architect from Tennessee DOT, and Val Bercovici, CEO and Co-founder of Chainkit, explain how the Department of Transportation's solution architecture and Chainkit's eXtended Integrity Monitoring (XIM) platform overcomes the critical integrity gap, protects all systems and data from a SolarWinds-style attack, and reduces DOT's cyber liability premium by 80%. In this on-demand you...
Add Favorite
FAR Part 42- Contract Administration An...
This part prescribes policies and procedures for assigning and performing contract administration and contract audit services.
Add Favorite
Federal Government Q4 Opportunities
Join JSchaus & Associates for our Webinar Wednesday Series JSchaus & Associates helps product, service and software firms with professional services: proposal writing marketing capture compliance GSA Schedules and more To learn about us or our services please visit: https://www.jenniferschaus.com All webinars are complimentary and recorded. Contact info: Email: [email protected] Phone: 202-365-0598
Add Favorite
Dcode Virtual: Federal Chief Informatio...
Don't miss the chance to hear the perspective of Federal Chief Information Officer Suzette Kent on using tech tools to the fullest extent during a crisis and how Covid-19 will impact government modernization in the long term. To be the first to know about Dcode events, sign up for our newsletter at dcode.co/subscribe.
Add Favorite
Dcode Virtual: GSA Deputy Administrator...
Join us for a conversation with Allison Fahrenkopf Brigati, Deputy Administrator of the U.S. General Services Administration (GSA), about how GSA is supporting its mobile workforce while continuing to deliver on its mission and how widespread telework during the Covid-19 pandemic will affect the future. To be the first to know about Dcode events, sign up for our newsletter at dcode.co/subscribe.
Add Favorite
An EA Approach to Technology Business M...
Enterprise Architecture as a practice is well understood by IT teams due to well-understood categorization models for tracking and managing assets. IT Finance Management was driven by accounting standards that we often poorly aligned to IT assets. Now, TBM is bringing a complete methodology to both Business and IT groups within a single enterprise. Learn how Business groups benefit from the foundations of EA, and how IT groups can better under...
Add Favorite
Connect your Mainframe COBOL Applicatio...
Learn how to connect your mainframe COBOL applications to new channels, applications and services with APIs. See how we can help you service-enable COBOL programs and generate powerful APIs to connect your mainframe to a greater API ecosystem. Leverage your application business logic to create new capabilities to share and how to consume capabilities offered from extended APIs.
Add Favorite
CyberCast: Secure Remote Access for Adm...
YOU’VE SECURED THE WORKFORCE, NOW SECURE PRIVILEGED ACCESS. Current work-from-home requirements have resulted in organizations enabling entire workforces for remote access. As the FBI and other agencies report, this is a boon for cyber attackers who see this expanded attack surface as a feeding frenzy opportunity. Organizations of all sizes are at increased risk and need to secure remote access for privileged users, whose identities can...
Add Favorite
Back to Search Begin New Search