GSA Facilities Solutions on MAS Training
Join this virtual meeting for an introduction of the GSA's Facilities Maintenance and Management Schedule. In this virtual 1 hour training session you can expect: An introduction of the Facilities Maintenance and Management Schedule To have a better understanding of the facilities related solutions that are available on the Multiple Award Schedule (MAS) Ordering options and flexible features Helpful tips on how to use the schedule and gain acc...
From Documents to Digital: Transforming...
How is your agency approaching digital-centric engineering? Join moderator Jared Serbu, and government and industry leaders as they discuss the benefits of digital-centric engineering vs. document-engineering approaches, best strategies and lessons learned. Learning objectives: Current overview of digital-centric vs. document-centric engineering approaches Tactics to embrace digital engineering practices How agencies can partner with industry...
Exploring Five Emerging Cybersecurity D...
In the world of cybersecurity defenses, the only constant is change. More than 3,500 cybersecurity vendors are continuously innovating, finding new ways to mitigate risks and secure modern computing environments. Join Steve Piper, Founder & CEO of CyberEdge (and proud CISSP), as he reviews five emerging cybersecurity defenses, including: SaaS security posture management (SSPM) Cloud-native application protection platform (CNAPP) Cloud infr...
May 1, 2024
Organizer:
ISC2 Location:
Webcast
Alliant 2 DPA Training
Who Should Attend: All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how Alliant 2 can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against Alliant 2. This web...
Securing Success: RMF and Zero Trust Un...
Our digital world is more expansive than ever before, giving access to unprecedented capabilities for our business, government, and personal use. As digital transformation accelerates, the risks associated with cyberattacks grow and affect every aspect of modern business, from customer service to government operations to smart infrastructure. Cyber or Business resilience must be a critical component of all security strategies — yet it is...
April 25, 2024
Organizer:
ATARC Location:
Webcast
FAST24 - Securing Emerging Tech: Safegu...
This event will showcase GSA solutions that enable you to safeguard the future of your organization. Earn 3 continuous learning points (CLPs) in this free IT acquisition training! Join GSA and CISA experts to learn how to: Prepare for emerging technology such as quantum computing and Artificial Intelligence Plan for national security implications and threads like an AI directed cyberattack Access GSA’s solutions to stay compliant and mit...
How to Buy Cloud Computing for Government
This webinar shares how agencies can procure cloud computing. You’ll learn about the advantages of cloud computing, and how to use GSA’s contracts to make the cloud acquisition process easier and more efficient. There’s no charge for this event! Join us to: Get valuable information about cloud computing and its benefits to government Gain an overview of how GSA helps agencies with cloud acquisition Learn everything you need t...
Efficient Environmental Computing: Unle...
Container application performance is critical for the U.S. Environmental Protection Agency's (EPA) effective management of environmental data and enforcement of regulations. High-performance applications ensure timely decision-making and enhance scalability, enabling the agency to respond swiftly to emerging challenges. Join industry experts on April 24th and learn how to meet mission objectives, protect sensitive data, ensure the resilience o...
Tableau Enablement Series Part 4: The A...
Visual analysis in an iterative process for working with data that exploits the power of the human visual system. The formal core of visual analysis is the mapping of data to appropriate visual representations. But what exactly engages an audience effectively? Is it beauty? Is it clarity? Is it a great story? Join our webinar to discover the science behind the art of visualizing data in this example-rich course. We'll touch on human perceptio...
Alliant 2 DPA Training
Who Should Attend: All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how Alliant 2 can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against Alliant 2. This web...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.