FSSI OS4 Fourth Generation
The Federal Strategic Sourcing Initiative for Office Supplies Fourth Generation (FSSI OS4) solution provides customers with the ability to cut costs and increase efficiencies by buying everyday supplies such as pens, paper, and printing items from a list of vendors with negotiated low prices. Attend this webinar to:Get detailed information on how to order supplies through the FSSI OS4 purchasing channelSee a walk-through with GSA Advantage!ŽEa...
Are SLED Organizations Ready for Zero T...
Join Hypori, and Scoop Cyber for a live, in-person roundtable webcasted for remote attendees, where industry experts will share how SLED organizations are overcoming these challenges with a zero trust mobility strategy. This interactive session will explore practical solutions for:Ensuring Criminal Justice Information Services (CJIS) compliance and preserving the chain of evidenceMeeting Cybersecurity Maturity Model Certification (CMMC) requir...
Inspection & Assessment of Dams
This seminar provides comprehensive instruction in inspection and evaluation techniques for dams. The principles, concepts and procedures taught will be readily adaptable to any organization conducting dam inspections and evaluating their compliance with current design standards. Participants learn about a variety of dam types and their appurtenances, the function of typical dam features, and common dam failure modes and the conditions that ca...
A Collaborative Approach to AI Security...
Understanding how threat actors use AI to compromise environments has become a rising concern across the globe. Leveraging techniques such as proactive threat detection, detecting highly evasive threats, accelerating threat investigation and streamlining incident response are critical in adapting to today’s cyber threats. Join CDW and Infoblox for an interactive discussion on how to maximize AI benefits while managing risks. Key Learning...
Strategies for Building Better Website...
As a result of the COVID-19 pandemic shifting more operations online, people have increasingly turned to utilizing digital methods to access government services, and this trend has continued post-pandemic. The General Services Administration reported 5.6 billion visits to Federal Government websites within a 90-day period in 2022. While the use of digital government services has increased, user experiences still need improvement. A 2024 study...
Unlock Opportunities and Protect Your M...
Being authorized for FedRAMP High is crucial, particularly following the Executive Order on Improving the Nation’s Cybersecurity issued in May 2021, which aims to improve the nation’s cybersecurity and protect federal government networks. Attend our upcoming webinar on January 22nd to learn how Skyhigh Security, backed by FedRAMP High authorizations for Skyhigh Secure Web Gateway (SWG) and Skyhigh Cloud Access Security Broker (CASB...
Cyber Resilience for the Defense ...
Effective cybersecurity requires collaboration across IT infrastructure, security, and data protection, since each team has distinct roles and responsibilities. Integrating IT infrastructure, data protection, and data security provides significant value by offering a unified perspective on user activity, data monitoring, and data access during a cybersecurity incident. By understanding the data—its location, accessibility, and how to res...
January 22, 2025
Organizer:
FedInsider Location:
Webcast
Alliant 2 DPA Training
Who Should Attend: All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how Alliant 2 can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against Alliant 2. This web...
Modern ICAM Strategies: Real-Time Ident...
Join us for discussion on modernizing ICAM for secure, connected operations where our guests will explore how agencies are addressing fragmentation, integrating with zero trust and extending access management to the network edge. Learn how modern ICAM approaches are enabling secure data sharing, supporting IT modernization and enhancing user experiences. Key topics include:Moving toward a holistic ICAM approach and integrating with zero trust...
F5 Lab Day API Security: Capture the Flag
Are you ready to roll up your sleeves, crack a Red Bull, and see if you have what it takes to Capture the Flag? Join the F5 DISA team for an interactive Capture the Flag competition where you will compete against others to hunt for API vulnerabilities and learn how they work. See who has what it takes to identify vulnerable APIs and ultimately Capture the Flag! In this lab and Capture the Flag exercise, you will learn how to identify and mitig...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.