Early Warning Signals: The Strategic Va...
In today's volatile geopolitical landscape, the U.S. defense sector relies on thousands of Tier 2 and Tier 3 subcontractors for everything from missile systems to advanced AI chips. Yet, most traditional procurement and threat-monitoring tools fail to detect early signals of instability in these vendors, especially when the signals originate from foreign media, regulatory notices, or obscure disruptions buried in unstructured content.This webi...
Building Your AI BD Program for 2026
ChatGPT has become a go-to tool for many in GovCon BD, but using it effectively — and safely — is another story. In this webinar, we’ll demonstrate practical ChatGPT use cases for business development, show how to reduce risks around compliance, accuracy, and security, and then compare those results against secure, purpose-built AI solutions designed specifically for GovCon. You’ll see side-by-side examples and walk awa...
Building Your AI BD Program for 2026
ChatGPT has become a go-to tool for many in GovCon BD, but using it effectively — and safely — is another story. In this webinar, we’ll demonstrate practical ChatGPT use cases for business development, show how to reduce risks around compliance, accuracy, and security, and then compare those results against secure, purpose-built AI solutions designed specifically for GovCon. You’ll see side-by-side examples and walk awa...
From Sensors to Digital Twins: Real-Tim...
SAS and partner subject matter experts showed an insider’s view of the tools and strategies that some leaders in flood management are already deploying to better protect their citizens, as well as case studies that show how these approaches work in real-world scenarios such as: Rapid population growth, intensifying weather events, and legacy infrastructure are driving urgency for smarter flood management solutions. Local governments may...
Using Real-Time OSINT to Defend Against...
During this session, attendees:Learn how to aggregate, analyze, and act on open-source intelligence to detect threats earlier.Discover how to correlate cyber indicators with physical incidents for a unified risk picture.See real-world use cases of OSINT enhancing decision-making and operational readiness
Unlock the Power of OpenShift Virtualiz...
Carahsoft and Red Hat hosted an interactive virtual training that empowered IT teams to modernize operations and strengthen OpenShift skills. With growing demands for agility and efficiency, this hands-on session allowed participants to gain real experience in a live sandbox environment while learning best practices from Red Hat certified instructors.This training helped attendees:Build technical confidence through guided exercisesStreamline w...
Beyond MDBR: Why SLED Organizations are...
MS-ISAC’s free Protective DNS (MDBR) ended on October 1. With funding discontinued, the need to act is urgent. But this moment presents more than just a replacement decision; it’s an opportunity to upgrade this critical layer of cyber defense. Infoblox Threat Defense is the mature, best-in-class alternative, trusted by Federal and SLED organizations to deliver proactive, intelligent and resilient DNS-layer security. It ensures comp...
Hyland & AWS Digital Transformation Jou...
Digital transformation isn’t a one-size-fits-all leap — it’s a journey. Whether you’re exploring possibilities or looking to fully optimize your operations, Hyland & AWS's three-part webinar series will guide you through each stage of the process: Crawl. Walk. Run. Hyland & AWS experts hosted online sessions to break down practical steps, proven strategies and real-world examples to help your agency confidently...
DFW - Flying High with EPM
Managing budgets, forecasts, and financial reporting across a complex airport operation requires coordination and clarity. Dallas Fort Worth International Airport shows how they modernized how teams plan, analyze, and share data with new tools and integrations.In this on-demand webinar, you’ll learn how DFW:Streamlined the reporting process with pre-formatted, publish-ready outputsEnabled quick ad-hoc analysis directly in ExcelGained fle...
CMMC Compliance On-Prem: Leveraging Pri...
Attendees joined us for a CMMC strategy session designed for agencies seeking to streamline their path to compliance. Our panel of cybersecurity and compliance experts shared real-world strategies, best practices, and actionable insights that helped participants achieve and maintain efficient and cost-effective compliance. The session highlighted how to transform compliance from a challenge into a competitive advantage. Attendees learned how t...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.