Back to Search Begin New Search Save Search Auto-Notify
CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
November 10-14, 2025
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
Phoenix Cybersecurity Conference
Join Us in Phoenix for the Futurecon Cybersecurity Event!Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.Don’t miss our special ceremony recognizing our...
November 13, 2025
Organizer: FutureCon
Location: Phoenix, AZ
Add Favorite
Artificial Intelligence to Enhance Cybe...
In the rapidly evolving domain of cyber security, artificial intelligence (AI) stands as a pivotal force with dual capabilities: as an enhancement of agency security efforts and potential facilitator of offensive cyber-attacks. This virtual workshop will cover the multifaceted role of AI in cyber security, illustrating both its defensive and offensive capabilities. Workshop attendees will gain insights into the latest AI-powered cybersecurity...
November 13, 2025
Organizer: Digital Government Institute
Location: Webcast
Add Favorite
How to Translate AI into Stronger Cyber...
There have been plenty of articles warning of the cybersecurity risks posed by artificial intelligence (AI), whether it is bad actors – from hostile nation-states to cyber criminals – or new attack vectors caused by AI implementations. At the same time, numerous other reports point out that AI can strengthen cybersecurity. For agencies looking to incorporate AI into their systems, cybersecurity is a great place to focus. AI tools c...
November 13, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Neo4j Good to Great Graph Database Workshop
Graph technology is a vital component for AI systems, enhancing machine learning algorithms by improving their robustness, precision, accuracy and explainability. Join Neo4j in Reston, VA for our Good to Great: Graph Database Federal Workshop. Through a series of hands-on sessions led by Neo4j experts, you can expect a focus on:Graph Basics: Learn how Neo4j graph technology and Cypher can speed up your mission outcomesLLM Knowledge Graph Build...
November 13, 2025
Organizer: Neo4j Government Team at Carahsoft
Location: Reston, VA
Add Favorite
Access by Design 2025
The Department of Justice's latest accessibility mandate is more than a compliance update—it’s a call to action for agencies to modernize digital services with inclusivity at the core. Join us for Access by Design 2025 to hear Adobe and public sector leaders share practical strategies for advancing digital accessibility and scaling compliance without sacrificing innovation. Specifically, you will:Discover how Adobe, uniquely positi...
November 13, 2025
Organizer: Adobe Government Team at Carahsoft
Location: Austin, TX
Add Favorite
Future-Proofing Flood Modeling: Meeting...
Flooding is no longer a rare event; it is an increasing reality for communities across the country. New federal standards updated floodplain maps, and resilience-focused mandates are reshaping how sewer and drainage systems must be designed. Infrastructure built on outdated assumptions risks being undersized, leaving critical services, property, and public safety exposed. Join us for a complimentary webinar where we will examine how modern flo...
November 13, 2025
Organizer: Bentley Government Team at Carahsoft
Location: Webcast
Add Favorite
Signal Through Noise: An Intelligence-L...
This workshop explores an intelligence-led approach to cybersecurity, moving defenders from reactive postures to proactive resilience. We'll examine the modern threat landscape, adversary tactics, and blueprint a defensible architecture with comprehensive visibility. The core then shifts to active defense through threat hunting and disciplined incident response. Finally, we'll discuss leveraging SOAR and AI to scale and optimize securi...
November 13, 2025
Organizer: Google Government Team at Carahsoft
Location: Boulder, CO
Add Favorite
Alliant 2 DPA Training
Who Should Attend: All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how Alliant 2 can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against Alliant 2. This web...
November 12, 2025
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Advancing Outcomes Through Efficient Se...
Government agencies are under increasing pressure to deliver high-quality services while optimizing resources. It has been a challenge as they wrestle with budget constraints and manpower limitations, but that emphasizes the urgency of producing better outcomes. By leveraging digital front door strategies and data-driven modernization, agencies can significantly enhance their service delivery capabilities. This approach enables the creation of...
November 12, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Back to Search Begin New Search