Microsoft Discovery Hour: Accelerate In...
Join us at Microsoft Discovery Hour: Accelerate Innovation with Low Code to see how to reshape your organization by putting AI at the forefront of your business. During this free event, you’ll learn from industry thought leaders and join interactive discussions to see how to use Microsoft Power Platform to build a hyperautomation practice at scale with AI-powered automation tools. You’ll find out how to help your organization accel...
June 6, 2024
Organizer:
Microsoft Location:
Webcast
OASIS CPRM Overview of Reporting
This training class will be an open session for any questions related to CPRM Failure to ensure the CAF is appropriately included in all task order solicitation responses and subsequent task order awards, on a separate line item, may lead to contract non-compliance. It is critical to ensure CAF is paid to you by ordering contracting offices, so that you may in turn remit payment to GSA. Your OASIS contract requires you to report new task order...
Disrupting The Battlespace: Developing...
Today, some of the best technologies in the world are developed within the US private commercial sector, creating potential to fulfill the Department of Defense's (DOD’s) demand for innovative, reliable, and efficient emerging technologies and systems. However, new technology is often developed outside of the DOD’s ecosystem by startups, making it difficult to forecast its potential impact, especially for defense and national secur...
June 6, 2024
Organizer:
GovExec Location:
Webcast
Powering a Future-ready Government with...
Government agencies are updating their network infrastructure to meet the increasing demand for digital services and accommodate a distributed workforce, but these enhancements come with new challenges–like network complexity, lifecycle costs, and security. Unlike bolt-on solutions, Juniper Networks’ AI-Native Networking Platform is a game-changing solution conceived and developed with AI integration at its core to address these ch...
Overcoming Challenges & Creating Opport...
Government entities encounter distinct obstacles in both securing and administering grants, which play a crucial role in promoting sustainable growth, providing essential services, and enhancing the well-being of communities. Despite the abundance of funding opportunities, these come with their own complexities, introducing significant administrative challenges towards grant management and regulatory compliance.Join our webinar on June 6th as...
What Government Agencies Do You Registe...
What Government Agencies Do You Register With And Where To Find Them In Government Contracting REGISTER HERE Come join us weekly as we train and prepare you to capture government contracts. These sessions are designed to prepare those enrolled in the Certified Capture Manager (CCM) Program to prepare their businesses for success and to prepare them to become certified capture manager professionals. CLASS TIME: Every Thursday evening from 6pm...
Supercharge Your Security by Unlocking...
If you have purchased Microsoft Defender XDR but have yet to deploy the Defender for Endpoint component, it’s time to put your investment to work. In today’s landscape, the average cost of a data breach exceeds $4 million globally.1 Defender for Endpoint helps to protect your business with automated, AI-powered capabilities that detect and respond rapidly to threats across the chain—including phishing, malware, and ransomware...
June 6, 2024
Organizer:
Microsoft Location:
Webcast
Evolution of SIEM in the Cloud
In recent times, the landscape of Security Information and Event Management (SIEM) solutions has experienced a remarkable metamorphosis. No longer confined to being mere data repositories, SIEM platforms have evolved into dynamic hubs brimming with invaluable insights. Join us in this webcast as we embark on a journey through the contemporary realm of SIEM, spotlighting its departure from traditional methodologies, shifting to the cloud, and i...
Phishing-Resistant Solutions: Modern Au...
As the deadline to implement phishing-resistant multi-factor authentication (MFA) nears for federal agencies, federal identity, credential, and access management stacks need to consider all organizations that do business with the Federal Government. Vendors and System Integrators must adopt phishing-resistant MFA solutions to meet the requirements being implemented by federal agencies by the end of FY2024. UberEther and Nok Nok have invited Yu...
APEX, CMMC and Project Spectrum
Securing government contracts is becoming increasingly challenging due to stringent requirements such as FedRAMP and CMMC. If your clients aim to secure contracts with the DoD, join us for this timely web discussion, hosted by Cyturus, in collaboration with Carahsoft and The Cyber AB, exclusively for APEX Accelerator Consultants. This session aims to equip APEX Consultants with resources specifically designed for APEX consultants and their cli...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.