Back to Search Begin New Search Save Search Auto-Notify
FY24 National Firearms Program
Come learn about the National Firearms Program and how to report excess Firearms and other Specialized Categories of property (Aircraft, Vessels, Animals, and Foreign Gifts) into PPMS.gov for disposal (manage the disposition). This class focuses on reporting excess the National Firearms Program and Firearms Management. There is no charge for this class and you’ll earn One Continuous Learning Point by completing this hour-long virtual tra...
May 7, 2024
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Service Branch Spotlight: Space Force
The space and cyber domains continue to become more contested and more critical to events on the battlefield. Join Defense One as we talk with Space Operation Command about how they are training and preparing combatant commands to address specific space- and cyber-related threats—and what recent reoptimization efforts mean for the future of SpOC.
May 9, 2024
Organizer: GovExec 360
Location: Webcast
Add Favorite
Driving Public Trust: High Impact Servi...
While all agencies are committed to rebuilding customer experience (CX) — and trust — in the 21st century, High Impact Service Providers, or HISPs, and equivalent models, are the agencies leading the design and implementation of CX initiatives due to the scale and critical nature of their public-facing services. Join Okta to better understand: The government's CX efforts that are underway The definition of HISP, key players, and th...
May 15, 2024
Organizer: Okta Government Team at Carahsoft
Location: Webcast
Add Favorite
DoD: Embracing Continuous Monitoring
Federal cyber leaders are tasked with the challenge of balancing active defense efforts, particularly when the U.S. is involved in international conflict, with building an infrastructure secure from the individual device all the way to enterprise environment. To do all of that, defending their networks and building for the future, DoD leaders must prioritize continuous monitoring of their cyber systems to address hidden vulnerabilities to addr...
May 21, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Benefits of Designing for Exportability...
Benefits of Designing for Exportability to Maximize Your International Business Join us for an insightful webinar on designing for exportability to master navigating the International Traffic in Arms Regulations (ITAR) and Technology Security and Foreign Disclosure (TSFD) requirements of the Arms Export Control Act (AECA). In this one-hour webinar, we will examine the jurisdiction and classification process, TSFD processes, and best practices...
May 23, 2024
Organizer: Content Enablers
Location: Webcast
Add Favorite
Defending the Ballot Box: What It Takes...
With a new election around the corner and last election's voting dramas still in our minds, security concerns around digital voting booths are at an all time high. Not only does a democracy require a secure voting system to function at all, but the voting public must be able to feel confident that the election has been handled safely and honestly. Without this trust, our nation’s public institutions could find themselves vulnerable. Desp...
September 10, 2024
Organizer: CISO Insights
Location: Webcast
Add Favorite
How IADS and SAMs Work: Metric Accuracy...
This presentation will discuss the basic principles of an Integrated Air Defense System (IADS), and the basic characteristics of a radar-guided missile system. This will be an overview webinar, not a detailed discussion. You will leave the webinar with a basic understanding of how IADS and missile intercepts work from the short discussion of each of the following 8 topics: Target detection, resolution, and countermeasures (noise jamming) Varia...
October 17, 2024
Organizer: Association of Old Crows
Location: Webcast
Add Favorite
Cyber Warfare: What We’ve Learned From...
Modern conflict increasingly centers around technology and digital infrastructure. The battlefield is no longer solely a physical stretch of terrain between territories; war is waged behind enemy lines, within their networks and inside their security systems. Cyber attacks can be hugely debilitating when launched successfully, causing widespread damage and incapacitating many functions. How can entities protect their operations from opponents,...
November 12, 2024
Organizer: CISO Insights
Location: Webcast
Add Favorite
2025: DFARS Overview - Introduction to...
Join Washington DC based, Jennifer Schaus & Associates in the 2025 Webinar Series covering The DFARS, Defense Federal Acquisition Regulations Supplement. This series features guest speakers who will uncover the important details and nuances of The DFARS. Get educated about the rules and regulations in the game of federal contracting. This series is COMPLIMENTARY & RECORDED. Recordings are posted on our YouTube Channel. CORPORATE SPONSO...
February 19, 2025
Organizer: Jennifer Schaus & Associates
Location: Webcast
Add Favorite
2025: DFARS Part 201, Federal Acquisiti...
Join Washington DC based, Jennifer Schaus & Associates in the 2025 Webinar Series covering The DFARS, Defense Federal Acquisition Regulations Supplement. This series features guest speakers who will uncover the important details and nuances of The DFARS. Get educated about the rules and regulations in the game of federal contracting. This series is COMPLIMENTARY & RECORDED. Recordings are posted on our YouTube Channel. CORPORATE SPONSO...
February 21, 2025
Organizer: Jennifer Schaus & Associates
Location: Webcast
Add Favorite
Back to Search Begin New Search