Making the Case for Triage
Are your law enforcement investigators and forensic examiners equipped with the right strategies for digital forensic triage at crime scenes or during initial evidence collection? Making the most of information gathered on-site has never been easier. Learn how to leverage the unique aspects of each investigation to make informed decisions, achieve targeted and relevant results and collect data that propels the investigation forward, all while...
Optimizing Ecosystems for Engagement, I...
Organizations are rapidly evolving beyond traditional Learning Management System (LMS) platforms toward connected learning ecosystems designed to drive engagement, close skill gaps and support performance in the flow of work. Instead of static course catalogs and one-time training events, modern learning strategies are becoming more dynamic, personalized and embedded directly into everyday workflows. Join us for this complimentary webinar feat...
FAR Overhaul Reality Check: What Change...
The FAR overhaul is moving from policy conversation to operational reality, with an urgent mandate to buy faster, reduce friction and improve outcomes across federal missions. The bigger shift isn’t only what changes in the FAR, it’s how agencies and contractors must execute in a new environment. This webinar focuses on translating the new landscape into day-to-day execution. We’ll explore how “simplification” oft...
Life After Microsoft Project Online: Pr...
Join us for a tool-agnostic, educational webinar on how to navigate this shift strategically. Instead of focusing on “like-for-like” tool replacement, this session highlights the bigger opportunity: modernizing how government agencies plan, prioritize, fund, and deliver work. Key Discussion Topics:Redefining what counts as a “project”—looking beyond IT to include grants, policy work, and program deliveryStrategic...
Post Quantum Cryptography in the Federa...
The federal government continues to invest in the development of quantum computing, but agencies are recognizing that it poses a threat to current encryption approaches. The Government Accountability Office summed it up: “Unlike computers we use today, a sufficiently powerful quantum computer could break cryptography in just a few hours or days compared to the billions of years a conventional computer would take. Public-key cryptography,...
March 19, 2026
Organizer:
FedInsider Location:
Webcast
Philadelphia Cybersecurity Conference
Join Us in Philadelphia for the Futurecon Cybersecurity Event!Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.Don’t miss our special ceremony recognizin...
March 19, 2026
Organizer:
FutureCon Location:
King of Prussia, PA
Simplifying Video Streaming Accessibili...
Join us for an engaging session on video streaming accessibility, tailored specifically for local government agencies. Katy Jones, Granicus' Manager of Quality Engineering and Accessibility expert, will guide you through the essentials of creating inclusive experiences to ensure compliance. In this webinar, you'll learn how to:Simplify video streaming and archiving with intuitive tools designed specifically for government workflowsMaintain acc...
Enterprise Agile for Government: Secure...
On-prem Agile tools are going away just as pressure to deliver faster, more secure federal system increases. Government IT leaders must rethink how they support Agile at scale without sacrificing oversight, compliance or control. Join Broadcom, ICON Agility and Carahsoft on Thursday, March 19, 2026, for a webinar designed to help you navigate this shift. This webinar will explore practical options for agencies that need both enterprise-scale A...
Certificate of Cloud Security Knowledge...
Certificate of Cloud Security Knowledge v5 | Lectures and Labs Get Certified in Cloud Security with CCSK v5 Plus Certification Training Advance your career and strengthen your cloud security expertise with CCSK Certification Training—a globally recognized certification from the Cloud Security Alliance (CSA). Our comprehensive CCSK v5 Plus Training course fully prepares you for the Certificate of Cloud Security Knowledge (CCSK) exam with...
Fortra March Tips and Tricks Webinars
Join the March 17th webinar for topics covering:Regex vs. Fingerprinting: When to use simple pattern matching versus more advanced data fingerprinting to identify sensitive federal forms and IDsThe "Metadata Multiplier": How to leverage persistent metadata tags to automatically trigger downstream security actions like encryption at rest and Data Loss PreventionBridging the Cloud Gap: Tips for maintaining consistent classification labels as dat...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.