Back to Search Begin New Search Save Search Auto-Notify
Certificate of Cloud Security Knowledge...
Get Certified in Cloud Security with CCSK v5 Plus Certification TrainingAdvance your career and strengthen your cloud security expertise with CCSK Certification Training—a globally recognized certification from the Cloud Security Alliance (CSA). Our comprehensive CCSK v5 Plus Training course fully prepares you for the Certificate of Cloud Security Knowledge (CCSK) exam with in-depth knowledge and hands-on experience to secure complex clo...
November 17-19, 2025
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
Customization and Utilization of Dam Op...
Join us on Tuesday, November 18 from 12:00 PM - 2:00 PM Eastern for Customization and Utilization of Dam Operation and Maintenance Manuals. This webinar will provide participants with information on the preparation and utilization of operation and maintenance (O&M) manuals for dams of varying type and size. It will serve as an update to and expansion upon ASDSO’s 2014 webinar, “Developing Operations and Maintenance Manuals for...
November 18, 2025
Organizer: Association of State Dam Safety Officials
Location: Webcast
Add Favorite
Information Security Forum
The Chicago Forum is designed for information security practitioners across all industries to dive deep on specific topics, share insights, and network with peers. This one-day event incorporates breakouts with IANS Faculty, spotlight sessions on emerging technologies, and opportunities to network with your peers. Topics fall into three tracks:Security Architecture and Security OperationsGovernance, Risk Management, and ComplianceLeadership an...
November 18, 2025
Organizer: IANS
Location: Chicago, IL
Add Favorite
State of Defense Business Acquisition Summit
The Pentagon’s acquisition process has long posed challenges for both government and industry, with bureaucratic hurdles often slowing innovation. As the Department of Defense advances urgent modernization efforts, streamlining how the military buys and fields technology is more important than ever. From autonomous drones and AI-driven tools to munitions stockpiles and shipbuilding capacity, today’s security landscape demands faste...
November 18, 2025
Organizer: Defense One
Location: Washington, DC
Add Favorite
Defending The Digital State: Protecting...
Since 2018 there have been more than 4,300 ransomware attacks on businesses, educational institutions, healthcare facilities, and federal/state/local agencies. While the majority have targeted businesses, the three remaining groups all tie to governmental responsibilities, especially at the state and local levels. This means that ransomware attacks continue to pose an existential threat to state governments, disrupting essential services, comp...
November 18, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Shielding Education: Protecting School...
Organizations face an evolving landscape of cybersecurity threats, with insider risks posing complex challenges. Whether driven by malicious intent or negligence, insider threats can compromise security, disrupt operations, and expose sensitive data. Organizations must take the initiative to adopt strategies to mitigate these risks effectively. Learn from our industry experts as they demonstrate using ICS 500-27 as a benchmark for best practic...
November 18, 2025
Organizer: NetFoundry Government Team at Carahsoft
Location: Webcast
Add Favorite
Make Your Data Work for You - The Impor...
Agencies face growing pressure to secure and share unstructured data while meeting the demands of AI, Zero Trust and IT modernization. This webinar explores practical strategies to reduce risk, improve efficiency and enable secure collaboration across teams and environments. Key Takeaways:Reduce friction in managing and sharing unstructured dataMitigate risks in collaboration across agenciesAddress challenges in hybrid and multi-cloud environm...
November 18, 2025
Organizer: Egnyte Government Team at Carahsoft
Location: Webcast
Add Favorite
VETS 2 DPA Training
Who Should Attend:All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how the VETS 2 GWAC can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against the VETS 2 GWA...
November 18, 2025
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
The Insider Risk Playbook for Federal C...
Federal agencies are expected to detect insider threats early—before they compromise operations, national security or trust in government. This webinar will outline how public sector, cybersecurity and counterintelligence teams are shifting from reactive alert triage to proactive human risk management, using behavioral context and mission-aligned analytics. This session is designed for CISOs, insider threat leads and cyber operations tea...
November 18, 2025
Organizer: Red Vector Government Team at Carahsoft
Location: Webcast
Add Favorite
State of Code Webinar Series
Recent projections reveal the staggering cost of poor software quality: over $2.41 trillion annually in the US, with nearly two-thirds attributed to the cybercrime fueled by insecure code. Register for Sonar's State of Code webinar series to learn how their integrated solution for code quality and code security analysis is designed to help software developers reduce this cost and streamline workflows with AI. Join Sonar solution experts online...
November 18, 2025
Organizer: Sonar Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search