The EW in Academia
Considering EW as one’s academic field can - and in the presenter's experience does - lead to questions related to one’s sanity, this webinar will argue that EW is actually an excellent vehicle for research, and especially, teaching - the traditional tasks of academia. There is a surprisingly large number of publications on EW topics in the open literature. Some examples of such topics will be considered, along with some interestin...
In Defense of the Police
In this webinar, we will discuss current cutting-edge issues involving many facets of law enforcement and criminal justice in general. We will examine styles of policing along with their pros and cons, the use of force along with use of force data, and legal issues including case law and liability-related matters such as immunity. We will look at police reform efforts through the ages and what some now propose. We will examine the role of ethi...
Unlocking the Secrets of Debriefings, G...
Subject Matter Experts (SME), Katie Burrows and Eric Valle with PilieroMazza PLLC, will present briefings on what happens after your proposal is submitted, including how agencies evaluate your proposals and what they are looking for, what information you are entitled to in a debriefing and an overview of the protest process. Questions often asked are: What should we do after receipt of an unsuccessful offeror notice? Do we have a right to a de...
Data Privacy, Cybersecurity, Generative...
This webinar features AWS, Microsoft and Morgan Lewis keynotes, offering technical, legal and compliance insights across the three critically important areas of Data Privacy, Generative AI and CyberSecurity. It is designed for IT/Technology leaders, General Counsel/Attorneys and their legal staff, plus Finance/Audit, Corporate Risk and Insurance professionals. Topics to be discussed are listed below. Click on green button to register, scroll d...
January 25, 2024
Organizer:
Angelbeat Location:
Webcast
Unlocking the Secrets of Small Business...
In this session, we delve beyond the surface to reveal the true potential of your company's financials. Learn how to effectively assess project profitability, navigate actual versus provisional indirect rates, harness key performance indicators, and optimize cash flow. Live Virtual Training | Beginner - Intermediate | 1.5 CPE/CLP | 90 minutes | $55 member/$69 non-member | Included in the Virtual Training Subscription Description: Discover the...
Microsoft Security Virtual Training Day...
Join us at Security Virtual Training Day: Security, Compliance, and Identity Fundamentals from Microsoft Learn to explore the basics of security, compliance, and identity—including best practices to help protect people and data against cyberthreats for greater peace of mind. You’ll also learn more about identity and access management while exploring compliance management fundamentals. Who should attend: IT professionals Security en...
January 24-25, 2024
Organizer:
Microsoft Location:
Webcast
Demo With Q&A: Java Application Testing
Would you like the ability to create meaningful JUnit tests with a single click? What if your team could increase code coverage from 0 to 60% in 5 minutes? Testing Java applications thoroughly requires attention to static analysis, unit testing, and code coverage. Automation makes it easier and faster to test Java code for compliance, security, and robustness. Join this demo to see how Parasoft Jtest addresses these testing needs in one comple...
January 24, 2024
Organizer:
Parasoft Location:
Webcast
Resiliency Tech Talk: Keeping up with D...
The Data Protection Trends Report is based on surveys of IT leaders and implementers from across the globe on their IT and data protection strategies. The January 2024 report breaks down the survey results of 1,200 IT leaders in enterprises across APJ, EMEA, and the Americas. The report provides insight into the data protection strategies that IT leaders are turning to in 2024 and beyond. Join Government Technology and Veeam for a live webinar...
The Secret to Effective Security Operat...
Arctic Wolf’s CTO, Sam McLane, will host our conversation with Retired FBI Supervisory Special Agent, Scott Augenbaum, who spent over three decades responding to thousands of Cyber Crime incidents. As one of the first FBI agents to investigate computer crime at the Federal Bureau of Investigation, Scott has seen firsthand the devastating effects that cybercrime has on organizations. Among sharing some of the secrets to effective security...
Alliant 2 DPA Training
All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how Alliant 2 can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against Alliant 2. This webinar is not open to...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.