Back to Search Begin New Search Save Search Auto-Notify
SEWP at World Congress 2017
Learn about Solutions for Enterprise-Wide Procurement and how we can assist your federal IT acquisition with the latest IT product solutions. On Monday, July 24, 2017, from 11:15am - 12:30pm, SEWP will be hosting a Panel Presetation in Session A13 intitle "Use if GWACs" ~ Acquiring IT Services Panel discussions on the various tools used for IT acquisitions. After World Congress concludes, grab lunch on your own and then join SEWP for an aftern...
July 26, 2017
Organizer: NASA SEWP
Location: Chicago, IL
Add Favorite
Cybersecurity Leadership and Governance
The goal for this course is to provide an understanding of cybersecurity leadership focused on people and not just technology and policy. It will give you an overview of frameworks to support your risk management activities. It is highly useful to any organizational executive, or leader seeking an understanding of building cybersecurity cultures and governance.The word cybersecurity is thrown around, used and abused to scare people into buying...
July 26, 2017
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Drones in the Federal Airspace and Inte...
The American Council for Technology and Industry Advisory Council (ACT-IAC) invites you to Drones in the Federal Airspace and Internet of Things (IoT) Forum on Wednesday, July 26, 2017 at the Renaissance Washington in Washington, DC.The theme, "Unleashing the Power of IoT and Drone Technology', will focus on how drones and IoT are currently being used in the federal arena and look to the endless possibilities that IoT and Drones can offer. The...
July 26, 2017
Organizer: ACT-IAC
Location: Washington, DC
Add Favorite
Issues in Identity, Credential, and Acc...
Last year, 63% of data breaches involved compromised identities. Traditionally, the Federal government has relied on Common Access Cards (CAC), Personal Identity Verification (PIV), and user name and password systems. As government settles into the “new normal” of mobile, cloud and other nontraditional access points for applications and other resources, these approaches fail to mitigate the risk. We’ll Discuss: Define the pro...
July 26, 2017
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Federally Employed Women's 48th Annual...
Join us from July 17-20, 2017, at the Hilton New Orleans Riverside in New Orleans, Louisiana, for Federally Employed Women's (FEW's) 48th National Training Program (NTP). The NTP is open to all employees from military, private and public sector organizations who want to climb the ladder to the next step in their career. All courses are Office of Personnel Management (OPM) Standards Aligned and target entry-level employees through senior decisi...
July 16-20, 2017
Organizer: Federally Employed Women
Location: New Orleans, LA
Add Favorite
Cybersecurity Leadership and Governance
The goal for this course is to provide an understanding of cybersecurity leadership focused on people and not just technology and policy. It will give you an overview of frameworks to support your risk management activities. It is highly useful to any organizational executive, or leader seeking an understanding of building cybersecurity cultures and governance The word cybersecurity is thrown around, used and abused to scare people into buying...
July 19, 2017
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
A Studied Look at Cloud in Government
Nearly seven years ago, the U.S. government began a mandated march to the cloud to accelerate the pace of innovation and contain costs. What about the cloud is working or not working? Are agencies fully realizing the promised cost savings? How pervasive is cloud adoption? And, what workloads are agencies putting into the cloud? A survey of 150 military, civilian and intelligence agency technology decision makers, conducted by Market Connection...
July 19, 2017
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Balancing Risk in the Internet of Things
The use of mobile technologies and the evolution to the Internet of Things (IoT) is reshaping the way government executes on its mission. From smartphones and tablets that let employees work from anywhere at any time to the wide adoption of WiFi at places like the Pentagon. The Department of Homeland Security recently reported that mobile devices could become an avenue to attack back-end computer systems containing the data of millions of Amer...
July 18, 2017
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Mobility Summit: The Mobility Hack
The Mobility Hack: Engineering the Secure Mobile Workforce Across the federal government, mobility has become a way of life, as the line between office employees and mobile employees is blurring and might soon disappear altogether. Federal employees expect to have access to the information they need no matter where they are what device they are using. Such capabilities are essential to improving the efficiency of the workforce and the quality...
July 18, 2017
Organizer: 1105 Media Public Sector Events
Location: Washington, DC
Add Favorite
Seven Steps to Avoid Bid Protests
You may have noticed that bid protests are rising rapidly in the federal contracting arena, as are the number of protests being sustained by GAO and the Court of Federal Claims. Both of these trends can have enormously negative consequences for your agency. So how can you avoid bid protests in the first place? Find out why bid protests occur and learn the steps you can take to prevent them in our Seven Steps to Avoid Bid Protests training cour...
July 18, 2017
Organizer: Centre Law and Consulting
Location: Tysons Corner, VA
Add Favorite
Back to Search Begin New Search