Back to Search Begin New Search Save Search Auto-Notify
GSS Q4 Buying Event Rollout: Laptops an...
Join GSA and federal leaders for the official launch of the GSS 4th Quarter Buying Event. This event will help agencies confidently complete laptop and desktop purchases in alignment with Executive Order 14240 and GSA’s governmentwide strategy. This event will include:Remarks from senior government leadersFull pricing details for GSS V11 configurationsStep-by-step guidance on placing orders before fiscal year-endTools to support your tea...
September 4, 2025
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Automate to Operate: Advancing DHS ...
Outdated processes and manual workloads are no longer sustainable for mission-critical operations. Federal agencies, like the Department of Homeland Security (DHS) and the Department of Justice (DOJ), must automate to stay ahead of threats, inefficiencies and growing demands.' Join Red Hat on September 4th to learn how Red Hat Ansible Automation Platform is already transforming how Federal teams operate by: Enforcing security at scale through...
September 4, 2025
Organizer: Red Hat Government Team at Carahsoft
Location: Webcast
Add Favorite
Defense News Conference 2025
Conference Theme: Deterring Threats from the Indo-Pacific 2025 Panel Topics Include: The State of Shipbuilding & the Navy’s Fleet​ Emerging Technology ​ Information Warfare​​ Demand for Unmanned​​ Ground Force Posture​​ Reinforcing Alliances​​​
September 3, 2025
Organizer: Defense News
Location: Washington, DC
Add Favorite
Cyber Resilience in a Turbulent Environ...
Join us as thought leaders from government and industry review how all these factors fit together and ways for agencies to minimize risk even with tight budgets and constrained resources. The cyber universe has always been a challenging space, with threats from hackers, cyber gangs and hostile nation-states. As technology has evolved, new attack surfaces are emerging and the complex environment is becoming increasingly turbulent. This series o...
September 3, 2025
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Facing the Two-Edged Sword of AI
Join us as thought leaders from government and industry discuss emerging best practices around the safe use of AI and the business infrastructure needed behind it. The use of artificial intelligence (AI) is introducing a paradigm shift in cybersecurity. On the one hand, AI is a powerful asset for cyber resilience, with its ability to automatically update defenses and quickly identify and respond to multi-pronged attacks. On the other hand, bad...
September 3, 2025
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Alliant 2 DPA Training
Who Should Attend: All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how Alliant 2 can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against Alliant 2. This web...
September 3, 2025
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Computers for Learning (CFL) for Federa...
This training will examine how federal agencies can help schools and educational non-profits serving some portion of the pre-kindergarten through grade 12 population by directly donating their excess computer equipment. This training will teach you (the federal agency) what your responsibilities are and how to navigate PPMS and the GSA-hosted Computers for Learning (CFL) website. Topics include CFL allocations, CFL requisitions, CFL manual tra...
September 2, 2025
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
GSA GWACs for IT Services-Based Solutio...
This is Delegation of Procurement (DPA) Training for all active GWACs Governmentwide Acquisition Contracts (GWACs) enable federal agencies to buy cost-effective, innovative solutions for information technology (IT) requirements from a Best-In-Class (BIC) designated contract vehicle. Because most, if not all, government agencies have a need to buy IT services and solutions, GSA has made this purchasing convenient through its GWAC Programs. In t...
September 2, 2025
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
TechNet Augusta 2025: Empowering Warfig...
Ivanti and Carahsoft invite you to a post-TechNet Augusta 2025 webinar focused on how emerging technologies are enabling Department of Defense agencies to innovate, adapt, and collaborate in support of their mission objectives. This session is designed for DoD professionals seeking to enhance operational effectiveness at the tactical edge through secure and agile mobility solutions. Discussion topics will include:How robust patch management en...
August 29, 2025
Organizer: Ivanti Government Team at Carahsoft
Location: Webcast
Add Favorite
CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
August 25-29, 2025
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
Back to Search Begin New Search