OASIS+ Delegation of Procurement Author...
OASIS+ Delegation of Procurement Authority (DPA) Training gives procurement staff access to the new OASIS+ contracts and teaches best practices for task order issuance. The DPA clearly delineates the roles and responsibilities between the GSA contracting officer and the ordering contracting officer and complies with the Office of Management and Budget's executive agent designation to GSA. Warranted OCOs (a contracting officer appointed pursuan...
GSA GWACs for IT Services-Based Solutio...
This is Delegation of Procurement (DPA) Training for all active GWACs Governmentwide Acquisition Contracts (GWACs) enable federal agencies to buy cost-effective, innovative solutions for information technology (IT) requirements from a Best-In-Class (BIC) designated contract vehicle. Because most, if not all, government agencies have a need to buy IT services and solutions, GSA has made this purchasing convenient through its GWAC Programs. In t...
Alliant 2 DPA Training
Who Should Attend: All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how Alliant 2 can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against Alliant 2. This web...
The Future of Network Security: A Thoug...
Modern application environments now extend across multi-cloud platforms, data centers, and distributed edge locations. With the rise of remote work and AI-driven applications, the attack surface is rapidly expanding. Traditional Next-Generation Firewalls (NGFWs) often fall short in securing this complex landscape or safeguarding AI models, leaving gaps that enable advanced threats. In this webinar, experts from SANS and Cisco will explore the...
CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
SANS Nashville Winter 2026
Unlock the full potential of your cybersecurity career at SANS Nashville Winter 2026 (January 12-17, CT). Guided by world-renowned instructors at the forefront of the field, this event provides exclusive access to live industry experts, ensuring you stay ahead of the curve. Immerse yourself in a learning environment that features industry-leading hands-on labs, simulations, and exercises, all geared towards practical application in your profes...
Intelligent Data Infrastructure: Poweri...
Federal Civilian agencies face mounting pressure to modernize IT infrastructure, adopt AI responsibility, strengthen cyber resilience, and embrace the cloud - all while improving efficiency, reducing costs, and protecting mission integrity. You're invited to join NetApp and Carahsoft for a webinar series designed to equip agencies with practical strategies, proven solutions, and expert insights for accelerating transformation across critical m...
ERM Workshop 2026
Join AGA and AFERM for a one-day virtual workshop designed to help federal professionals turn enterprise risk management (ERM) theory into action. This virtual event combines expert-led sessions with small, facilitated breakout discussions, giving you the tools and examples you need to apply ERM concepts within your agency.
January 14, 2026
Organizer:
AGA Location:
Virtual
Narrative Attacks Dont Go Viral on Thei...
In today’s information environment, threat actors, influencers and nation-states are targeting executives and organizations to shape public perception. These narrative attacks are intrinsically connected and aimed to cause financial, operational and reputational harm. The challenge is that these intelligence workflows often treat them as separate problems that threat intelligence and social listening can’t follow. This session draw...
An Hour at the Analyst Desk NDR Tableto...
Join Trellix and Carahsoft at our Analyst Desk — An NDR Tabletop Exercise! We are hosting a special session, "An Hour at the Analyst Desk", designed to give you a hands-on look at modern network threat hunting. During this interactive exercise, we will walk through a realistic kill-chain scenario. You will see exactly how an analyst uses Trellix NDR to pivot from a vague alert to a confirmed detection. It’s a great opportunity to s...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.