Mastering Automation with Okta Workflow...
Take your identity automation to the next level! Join Okta on January 15th to explore how Workflows can revolutionize the way you manage identity processes—no coding required.In this interactive session, you'll:Get a comprehensive overview of Okta WorkflowsDiscover real-world use cases to inspire your automation journeySee a live demo of Workflows in actionWhy Attend?Okta Workflows empowers you to automate even the most complex identity...
Certificate of Cloud Security Knowledge...
Certificate of Cloud Security Knowledge v5 | Lectures and Labs Get Certified in Cloud Security with CCSK v5 Plus Certification TrainingAdvance your career and strengthen your cloud security expertise with CCSK Certification Training—a globally recognized certification from the Cloud Security Alliance (CSA). Our comprehensive CCSK v5 Plus Training course fully prepares you for the Certificate of Cloud Security Knowledge (CCSK) exam with i...
AI and Analytics: Answering Healthcare'...
Unlock the power of advanced analytics with IPC Global and Qlik by joining our upcoming Healthcare Webinar Series. This carefully curated set of sessions focuses on key areas transforming your healthcare systems, from healthcare research and population health to grants management, supply chain optimization, and AI-powered operations. Whether you're looking to enhance decision-making, streamline operational processes, or modernize your work...
Cloud Native Application Security - Lif...
Agencies have invested heavily in migrating applications to the cloud and creating cloud-native applications to serve the public. Securing these applications has emerged as a primary objective, particularly in incorporating them into a zero trust architecture. Strengthening app security focuses on integrating security measures throughout the application lifecycle – from development to deployment – by using cloud-native technologies...
January 14, 2025
Organizer:
FedInsider Location:
Webcast
CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
Alliant 2 DPA Training
All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how Alliant 2 can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against Alliant 2. This webinar is not open to...
How to Buy Cloud Computing for Government
This webinar shares how agencies can procure cloud computing. You’ll learn about the advantages of cloud computing, and how to use GSA’s contracts to make the cloud acquisition process easier and more efficient. There’s no charge for this event! Join us to:Get valuable information about cloud computing and its benefits to governmentGain an overview of how GSA helps agencies with cloud acquisitionLearn everything you need to k...
Alliant 2 DPA Training
Who Should Attend: All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how Alliant 2 can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against Alliant 2. This web...
OASIS+ Delegation of Procurement Author...
OASIS+ Delegation of Procurement Authority (DPA) Training gives procurement staff access to the new OASIS+ contracts and teaches best practices for task order issuance. The DPA clearly delineates the roles and responsibilities between the GSA contracting officer and the ordering contracting officer and complies with the Office of Management and Budget's executive agent designation to GSA. Warranted OCOs (a contracting officer appointed pursuan...
Ransomware Risk Management (NIST 8374)
This training is designed to equip participants with the knowledge and skills needed to effectively manage ransomware risks within their organizations. Ransomware attacks pose a significant threat to businesses of all sizes, making it crucial for organizations to have effective risk management strategies in place. The NIST 8374 criteria provides a comprehensive framework for managing ransomware risks, aligning organizations' prevention and mi...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.