1,606 past events found
+ 6 on-demand webcasts found
Back to Search Begin New Search Save Search Auto-Notify
VETS 2 DPA Training
Who Should Attend: All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how the VETS 2 GWAC can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against the VETS 2 GW...
May 21, 2024
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
DoD: Embracing Continuous Monitoring
Federal cyber leaders are tasked with the challenge of balancing active defense efforts, particularly when the U.S. is involved in international conflict, with building an infrastructure secure from the individual device all the way to enterprise environment. To do all of that, defending their networks and building for the future, DoD leaders must prioritize continuous monitoring of their cyber systems to address hidden vulnerabilities to addr...
May 21, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Optimizing Human Performance in Tech Ev...
In today’s rapidly evolving technological landscape, government agencies face the daunting task of managing advancements in AI, cybersecurity, and more, while ensuring their workforce remains at the peak of performance. In the realm of agency operations, there are a multitude of challenges that arise, with increasing complexity and declining mental well-being among employees standing out as particularly significant risks to mission succe...
May 16, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
AFFIRM Up Lift: Strengthening Cybersecu...
In today's digital age, cybersecurity has become a crucial component of our nation's security. The recent cyberattacks on critical infrastructure, federal agencies, and private sector entities have shown us the severe and far-reaching consequences of cyber vulnerabilities. As a result, the Biden-Harris administration has made strengthening cybersecurity a top priority. On May 12, 2021, the Executive Order on Improving the Nation's Cybersecurit...
May 15, 2024
Organizer: AFFIRM
Location: Webcast
Add Favorite
Alliant 2 DPA Training
Who Should Attend: All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how Alliant 2 can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against Alliant 2. This web...
May 15, 2024
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Focus on Cyber Resiliency in a Hostile World
The internet is an increasingly dangerous place. The FBI warns of Chinese threats to U.S. critical infrastructure, while the National Security Agency releases guidance for strengthening AI system security. Meanwhile, agencies still wrestle with phishing, ransomware and myriad other threats that occur every day. At the same time, government organizations are expected to implement zero trust architectures, improve identity and access management,...
May 15, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Unlocking the Power of A.I. in eDiscovery
In an age where information overload is the norm, harnessing Artificial Intelligence technologies can be the game-changer your eDiscovery needs. Join industry eDiscovery industry experts George Socha (Reveal), Rose J. Jones (King & Spalding), and Zviad Guruli (WilmerHale) as they delve into the cutting-edge realm of leveraging A.I. in the legal practice of eDiscovery.
May 14, 2024
Organizer: American Bar Association
Location: Webcast
Add Favorite
Vision 2024: Getting in a New York (IT)...
The state of New York is emphasizing improving its IT resilience. The state’s 2022-23 strategic plan focuses on moving off legacy systems, implementing an enterprise architecture, and improving service delivery to its residents, to name a few. In addition, the state has its first cybersecurity strategy, and created a Joint Security Operations Center. As the largest city in the United States, New York City has its own technology roadmap,...
May 10, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Election Security: Protecting the Found...
Administering elections falls on the shoulders of state and territorial governments. It is not surprising, then, that there are so many different approaches, technologies, and processes in place to handle election infrastructure. The problems that befall election infrastructure are many, varied, and often well publicized. In Maricopa County, Ariz., ballots were too lightly printed to be read by scanners during the 2022 midterms. Multnomah Coun...
May 9, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Securing the Identity Fabric in the Age...
In the realm of government cybersecurity, the Zero Trust framework stands as a beacon of defense against evolving threats. Central to its efficacy are the principles of identity and access management, which redefine traditional security paradigms. Zero Trust advocates for perpetual verification of users, devices, and resources, emphasizing a “never trust, always verify” mantra. Identity verification, facilitated by multifactor auth...
May 9, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Back to Search Begin New Search