AI Adoption: Factors Agencies Should Consider
The original version of Moore’s law declared that the capacity of an integrated circuit – the backbone of IT – doubles every two years. For decision-makers in the era of artificial intelligence, this could be revised to observe that new versions of AI proliferate at an accelerated rate. Because AI is so new, yet already has so many offshoots, agencies are wrestling with which type of AI to implement – agentic or generat...
December 4, 2025
Organizer:
FedInsider Location:
Webcast
Transitioning to GitLab for Modern Plan...
IT leaders at the Department of War (DoW) are in the throes of major DevOps vendors phasing out on-premise tolls, pushing agencies toward cloud-only deployments. With this transition comes potential compliance requirement violations, inflated costs and eroded control over mission-critical information. Join GitLab on December 4th for an exclusive webinar where we'll review how your team can seamlessly migrate from legacy platforms with GitLab's...
From Chaos to Clarity: Mastering Applic...
Government agencies face mounting pressure to optimize their application portfolios due to rising costs, shadow IT, and the increasing complexity of emerging technologies and fragmented development practices. Application rationalization is no longer a one-time exercise; it’s a continuous discipline that requires alignment across people, processes, technology, and data. This session will introduce Forrester’s Application Portfolio R...
The Future Belongs to Learners: Deep Di...
Take your ChatGPT skills to the next level. Learn how to use advanced tools - Deep Research, Projects, Data Analysis, Canvas, Connectors and ChatGPT Agent - to move from simple prompting to structured, repeatable workflows. Join OpenAI to discover how these capabilities help government teams collaborate, analyze data and deliver results faster while maintaining enterprise security and compliance. What you'll gain: Ways to organize and auto...
Digital Government that Delivers: Accel...
Modern government depends on accurate data, efficient workflows and uninterrupted services. ABBYY empowers agencies to digitize and automate document-centric processes—from forms and IDs to permits and case files—turning data into action with its Intelligent Document Processing (IDP) solutions. But automation can only deliver if it stays available, compliant and performant. That’s where Reveille Software comes in. Together, A...
SANS 2025 Detection and Response Survey...
As cyber threats grow in complexity and frequency, organizations' strategies for detection and response must continuously evolve. The SANS 2025 Detection and Response Survey webcast will delve into the current state of cybersecurity operations, questioning whether the heavy emphasis on endpoint detection is creating new blind spots. By concentrating primarily on endpoints, organizations may narrow their scope and overlook threats emerging from...
Addressing Security Holes in Air Gapped...
As IT and security deployments migrate to the cloud, security gaps in air-gapped systems can be created unless attention focuses on threats such as data transfer from external storage media – for example, USB devices. Paradoxically, many agencies continue to maintain critical systems and data on air-gapped servers or on systems running end-of-life operating systems. The U.S. Department of War maintains critical air-gapped systems even as...
December 3, 2025
Organizer:
FedInsider Location:
Webcast
47-Day Certs: A Reality Check for Highe...
With TLS certificate lifecycles shrinking, manual renewals are becoming a high-stakes gamble. An expired certificate can disrupt student portals, the LMS, and critical research, creating operational chaos and compliance gaps related to FERPA, HIPAA, or NIST 800-171. It's time to shift from manual processes to a scalable automation strategy. Join us on December 2nd to learn how to: Inventory every certificate across your hybrid campus Estab...
GSA GWACs for IT Services-Based Solutio...
This is Delegation of Procurement (DPA) Training for all active GWACs Governmentwide Acquisition Contracts (GWACs) enable federal agencies to buy cost-effective, innovative solutions for information technology (IT) requirements from a Best-In-Class (BIC) designated contract vehicle. Because most, if not all, government agencies have a need to buy IT services and solutions, GSA has made this purchasing convenient through its GWAC Programs. In t...
Zero Trust Training | CCZT
CANCELED
In the dynamic realm of digital security, the necessity for advanced cybersecurity measures is paramount. Progressive companies committed to protecting their digital infrastructure should focus on supporting their employees’ professional growth by enrolling them in the Certificate of Competence in Zero Trust (CCZT) training. This specialized course provides an in-depth exploration of the Zero Trust framework, arming participants with cut...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.