Back to Search Begin New Search Save Search Auto-Notify
What Is A Capture Manager And Its Vital...
What Is A Capture Manager And Its Vital Role In Government Contracting (Class 1 Certified Capture Manager Training) Official Enrollment: www.CaptureManagement.org TO ATTEND CLASS ONE: REGISTER Come join us weekly as we train and prepare you to capture government contracts. These sessions are designed to prepare those enrolled in the Certified Capture Manager (CCM) Program to pass the CCM Exam and to become certified professionals. Also, these...
June 18, 2024
Organizer: Government Contractors Association, Inc.
Location: Webcast
Add Favorite
Sponsored Content: Palmetier Law - Unle...
Unleashing Small Business Innovations: A Path to Growth & ProsperityPART 1 of 2 SPONSORED CONTENT Webinar is Complimentary & Recorded Karri Palmetier, Palmetier Law The role of small businesses in driving innovation in the federal government has never been more crucial. This two-part webinar explores the basis and requirements of Small Business Innovation Research (SBIR) and Small Business Technology Transfer (STTR) programs and the wa...
June 20, 2024
Organizer: Jennifer Schaus & Associates
Location: Webcast
Add Favorite
Automation as a Cybersecurity Resource
Government agencies at all levels face cyber threats at an increasing rate. Ransomware attacks alone increased by 70% year over year in 2023. Yet agencies are constrained by budget limitations and the shortage of cybersecurity professionals, leading to trying to manage from crisis to crisis and never catching up. Automating security workflows can help agencies get a handle on their challenges and prioritize their security needs, but it isn...
June 20, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Growing Good in Government Initiative -...
The government’s ability to deliver value to its citizens is critically dependent on the holistic integration and alignment of its policies, goals, and objectives to its portfolios, programs, and projects. However, in its current state, there appears to be a pervasive misalignment and lack of coordination of roles and responsibilities across the Federal Performance Framework. The implementation of crucial legislations such as Evidence Ac...
June 24, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Protecting APIs and Sensitive Data
In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems. However, with this increased connectivity comes heightened security risks, particularly concerning the protection of sensitive data in those APIs. One of the most notorious examples of API risk is the Cambridge Analytica scandal in the...
June 26, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Securing Our States: Core Pillars of St...
Forward-thinking state and local governments are participating in the State Risk and Authorization Management Program (StateRAMP) as they build out a robust and secure IT infrastructure. Modeled after the federal government's FedRAMP, the nonprofit membership organization uses independent audits and continuous monitoring to verify that cloud services satisfy standardized state government security requirements and can be used by agencies in mul...
June 26, 2024
Organizer: Route Fifty x The Atlas
Location: Webcast
Add Favorite
Sponsored Content: Palmetier Law - Unle...
Unleashing Small Business Innovations: A Path to Growth and ProsperityPART 2 of 2 SPONSORED CONTENT Webinar is Complimentary & Recorded Kari Palmetier, Palmetier Law The role of small businesses in driving innovation in the federal government has never been more crucial. This two-part webinar explores the basis and requirements of Small Business Innovation Research (SBIR) and Small Business Technology Transfer (STTR) programs and the ways...
June 27, 2024
Organizer: Jennifer Schaus & Associates
Location: Webcast
Add Favorite
Zero Trust in Action: Approaches to Mob...
In today’s rapidly evolving cybersecurity landscape, Zero Trust has emerged as a critical strategy to defend organizational assets against persistent cyber threats. However, the presence of mobile devices in enterprise environments poses significant challenges to traditional Zero Trust implementations. As government agencies increasingly rely on mobile devices to conduct business and communicate, ensuring the security of these endpoints...
June 27, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
State & Local Cybersecurity for the 202...
Election security is top of mind across the United States, from concern about malign foreign interference, to DDoS attacks against election websites, to the security of voting machines and their software, to insider and third-party threats, even to “swatting” of local election officials, to name just a few. At the heart of all these threats is the intent to change the outcome of political races. Outcomes, in the end, are determined...
June 27, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Facilitating Low-Head Dam Removals and...
Join us on July 9, from 12:00 PM - 2:00 PM Eastern for Facilitating Low-Head Dam Removals and Improving Aquatic Resource Restoration Outcomes. Many low-head dams no longer serve their original purpose and their existence often poses a public safety risk and continues to have negative impacts on aquatic resources. This webinar will focus on effective strategies for low head dam removal and aquatic resource restoration in Pennsylvania over the l...
July 9, 2024
Organizer: Association of State Dam Safety Officials
Location: Webcast
Add Favorite
Back to Search Begin New Search