Back to Search Begin New Search Save Search Auto-Notify
VETS 2 DPA Training
Who Should Attend: All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how the VETS 2 GWAC can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against the VETS 2 GW...
June 18, 2024
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Multi-Layered Identity Authentication f...
As fraud actors increase their operations in velocity and capabilities, especially with the use of emerging technologies as the weapons of choice, you and your citizens are at risk of becoming a victim. Are you able to rapidly and at scale, confirm who is behind the keyboard? If the answer is no, then this webinar is for you. It will help you in solving your identity authentication challenges, diminishing a fraudster's success. Our esteemed sp...
June 18, 2024
Organizer: Socure Government Team at Carahsoft
Location: Webcast
Add Favorite
Powering Content Velocity with Generati...
Adobe and Carahsoft are excited to invite you to join us in the lead up to TechNet Cyber 2024 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Join us for our complimentary webinar to learn how Adobe solutions drive innovation, adaptation, and collaboration within the Healthcare industry! Specifically, attendees of this webinar will learn how to: Supercharge miss...
June 18, 2024
Organizer: Adobe Government Team at Carahsoft
Location: Webcast
Add Favorite
How to Secure Your Agency's Identities...
A zero trust approach to securing your infrastructure is fundamental to reducing risk — and securing identities lies at the core of a successful zero trust strategy. Together, BeyondTrust and Ping Identity deliver the key components of zero trust including privileged identity security, using multi-factor authentication and SSO, with complete visibility and analytics. Join us on June 18 at 1:00pm ET for a tech talk and live demo to see ho...
June 18, 2024
Organizer: BeyondTrust Government Team at Carahsoft
Location: Webcast
Add Favorite
Women in AFCEA Virtual Happy Hour: June 2024
Join Women in AFCEA for our popular virtual happy hour! Switch off from work, grab a drink, and join your fellow women professionals for a positive chat about life in the IT/Cyber/Global Security industry. This month we'll be chatting with WIA marketing lead, Ariel Glassman, about how to optimize your LinkedIn profile and how to make it work for YOU!
June 18, 2024
Organizer: AFCEA International
Location: Webcast
Add Favorite
Virtual Lunch N Learn with Workvivo
In this webinar you will learn how Workvivo by Zoom can personalize and automate communication and increase engagement throughout your organization. According to a research study by Gallup, agencies with a high engagement rate also have increased profits, decreased absences, and experienced a fast turnover from any form of economic challenges. Topics that will be covered include: The latest innovations created by Zoom on the communications fro...
June 18, 2024
Organizer: Zoom Government Team at Carahsoft
Location: Webcast
Add Favorite
Unmasking Cyber Shadows: Enhancing Cybe...
Meet a powerful ally in the world of Cybersecurity: Constella Intelligence's Deep OSINT investigations fueled by AI, it taps into the world's largest breach data lake collected from the surface, deep and dark web. Join us to learn how agencies can leverage deep OSINT to:Disrupt crime at its source by uncovering synthetic Identities Conduct cybercriminal identify graphing to unveil threat actors at the individual level Achieve greater scalabili...
June 18, 2024
Organizer: Constella Government Team at Carahsoft
Location: Webcast
Add Favorite
Engineering Cybersecurity Mitigations f...
Large water utilities are looking to gain efficiencies by adopting new distributed edge devices and digital transformation initiatives incorporating the latest machine learning and AI algorithms. Meanwhile, small to mid-size municipalities, are wanting to maintain their reliability without increasing their rate-base. Yet, a worsening threat environment looms over North American and European operators. Increasingly sophisticated criminal ransom...
June 18, 2024
Organizer: Waterfall Security
Location: Webcast
Add Favorite
Event-Driven Ansible Workshop + Getting...
As a part of Red Hat® Ansible® Automation Platform, Event-Driven Ansible can process events containing discrete intelligence about conditions in the IT environment, determine the appropriate response to the event, then execute automated actions to address or remediate the event. This workshop will demonstrate Event-Driven Ansible and how it provides the event-handling capability needed to automate time-consuming tasks and respond to changing c...
June 18, 2024
Organizer: Red Hat
Location: Boston, MA
Add Favorite
Event-Driven Ansible Technical Workshop
As a part of Red Hat® Ansible® Automation Platform, Event-Driven Ansible can process events containing discrete intelligence about conditions in the IT environment, determine the appropriate response to the event, then execute automated actions to address or remediate the event. This workshop will demonstrate Event-Driven Ansible and how it provides the event-handling capability needed to automate time-consuming tasks and respond to changing c...
June 18, 2024
Organizer: Red Hat
Location: Reston, VA
Add Favorite
Back to Search Begin New Search