TSP Planning With Ed Zurndorfer
An Overview of the Thrift Savings Plan (TSP) Contributions and how they work, including limits and getting the biggest match Ways to maximize tax savings The main differences between Roth and Traditional TSP accounts Understanding the Different Funds An overview of the five main TSP funds (G, F, C, S, & I) and the Lifecycle (or “L” Funds), plus tips for developing an effective investment strategy that matches your time horizon,...
Alteryx Partner Boot Camp for Public Sector
Don't miss this exclusive, full-day Alteryx Partner Essential event! This immersive session equips you with the technical knowledge and best practices to provide your customers with clear value. Learn to guide them on their data journey, helping them unlock immediate, actionable insights that address their unique business needs. Join us to learn the latest on the Alteryx product platform Understand the future-state of our Partner Program Stru...
Federal Acquisition Conference
On June 20, join Acquisition leaders from across the government agencies discuss key emerging acquisition trends and initiatives in their respective organizations, as well as those with government-wide impacts. With an eye toward addressing challenges—both expected and novel—of the foreseeable federal marketplace, this conference will highlight practical, actionable govcon strategies for not only surviving but thriving in the gover...
From Legacy to Leading Edge: Embracing...
As organizations pivot towards digital-first strategies, the imperative to adopt scalable and flexible identity frameworks has never been more critical. In an increasingly interconnected world, it is crucial for organizations to build a resilient identity architecture that not only supports current needs but anticipates future demands. Join CyberArk and UberEther on June 20th to explore the transformative journey from traditional, on-premises...
AI and State-Sponsored Espionage - A We...
Join Google Cloud, Mandiant, and GuidePoint Security for panel discussions focused on the dangers of state-sponsored cyber espionage and how Artificial Intelligence (AI) is rapidly changing the world and, with it, the landscape of cyber threats. AI is being utilized by both attackers and defenders, with the adversarial use of AI posing a growing concern. Recent trends indicate that cyber espionage is on the rise, and the employment of AI by th...
SolarWinds Technology Workshop - Columbus
Join SolarWinds for a one-day, interactive workshop at the Columbus Country Club to learn more about the technology challenges facing state and local agencies and the best practices for IT service delivery & infrastructure, observability, compliance and reporting. This interaction session will also deep dive into SolarWinds Hybrid Cloud Observability–our most comprehensive monitoring platform for your observability needs. Presentatio...
Automation as a Cybersecurity Resource
Government agencies at all levels face cyber threats at an increasing rate. Ransomware attacks alone increased by 70% year over year in 2023. Yet agencies are constrained by budget limitations and the shortage of cybersecurity professionals, leading to trying to manage from crisis to crisis and never catching up. Automating security workflows can help agencies get a handle on their challenges and prioritize their security needs, but it isn...
June 20, 2024
Organizer:
FedInsider Location:
Webcast
Procurement Integrity - Analytics to Re...
SAS' solutions introduce an approach to layer an analytic system on top of your existing systems, creating a continuous monitoring solution. In their upcoming webinar, subject matter experts will highlight real world examples, showing how other government entities improved their procurement and accounts payable processes by integrating with SAP, Oracle and other ERP systems. Join SAS' webinar, where you can also expect to learn more about: Ris...
Achieving Cybersecurity Resilience in S...
New Mexico recently issued Executive Order 2024-011, a comprehensive state-wide security assessment to identify vulnerabilities in cybersecurity and necessitates that all state agencies adopt the National Institute of Standards and Technology (NIST) standards for cybersecurity by November 1, 2024. Register now to hear how Synopsys can help you navigate the requirements of EO 2024-011 and secure your critical applications. Join Synopsys on Jun...
How to Hunt for Volt Typhoon Malware in...
The federal government has strenuously and repeatedly stated that critical infrastructure providers must be proactive in hunting for malware that may be present in networks, focusing specifically on CCP-sponsored Volt Typhoon Adversary. Join critical infrastructure experts for a panel discussion on how to hunt for Volt Typhoon. Discussion topics will include: How Four18 Intelligence uses UnknownCyber ThreatHunter to hunt for Volt Typhoon and...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.