Back to Search Begin New Search Save Search Auto-Notify
Elevate Your Compute Performance with H...
Your infrastructure might still be running, but at what cost? Join HPE and Carahsoft for an exclusive public sector webinar exploring how the latest HPE ProLiant Gen12 Compute can help agencies modernize aging infrastructure while meeting the demands of today’s workloads—from virtualization to AI. As government IT teams face rising costs, increasing security risks, and limited visibility into legacy systems, this session will intro...
August 21, 2025
Organizer: HPE Government Team at Carahsoft
Location: Webcast
Add Favorite
Alliant 2 DPA Training
All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how Alliant 2 can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against Alliant 2. This webinar is not open to...
August 20, 2025
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
2025 5G Summit - What's Happening Today...
5G networks first made their appearance in 2019, when major telecommunications carriers started rolling them out. Today, more than half the U.S. has 5G coverage, mostly in more densely populated areas. By 2030 it is estimated that more than 90% of mobile data coverage will be 5G. And it has been as significant a change as promised, with download speeds up to 20 Gbps, resulting in very low latency (signal delay) – one reason that streamin...
August 20, 2025
Organizer: FedInsider
Location: Reston, VA
Add Favorite
Weaponized Malware vs. Encryption ...
This webcast will discuss the tactics used by weaponized malware to infiltrate a phone, the advancements and capabilities of forensic surveillance tools, and extracting encrypted data from Signal Messenger. This presentation is essential for security decision-makers and anyone looking to proactively protect the mobile network from the latest malware and digital surveillance tactics. GIAC and ISC2 members can earn CPE credits for attending this...
August 20, 2025
Organizer: RSAC
Location: Webcast
Add Favorite
Adopting an Offensive Security Posture:...
Traditional methods of vulnerability assessment are no longer adequate to find exploitable security weaknesses before adversaries. This webcast will examine the evolution and importance of offensive security, emphasizing the shift from reactive to proactive strategies. Join SANS Principal Instructor Jorge Orchilles, and Cobalt SVP of Product Jason Lamar, as they delve into essential concepts, and offer practical guidance for adopting an offens...
August 20, 2025
Organizer: SANS Institute
Location: Webcast
Add Favorite
How to Buy Smarter: An Intro to GSA’s G...
In support of Executive Order 14240, federal agencies are expected to use GSA’s Governmentwide Strategic Solutions blanket purchase agreements for laptops and desktops. These single-award BPAs offer standardized configurations, competitive pricing, and easier ordering through platforms you already use — GSA AdvantageSelect, eBuy, and BPA Holder catalogs. This webinar will help acquisition and IT professionals understand:What the GS...
August 20, 2025
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Certificate of Cloud Security Knowledge...
Certificate of Cloud Security Knowledge v5 | Lectures and Labs Get Certified in Cloud Security with CCSK v5 Plus Certification Training Advance your career and strengthen your cloud security expertise with CCSK Certification Training—a globally recognized certification from the Cloud Security Alliance (CSA). Our comprehensive CCSK v5 Plus Training course fully prepares you for the Certificate of Cloud Security Knowledge (CCSK) exam with...
August 18-20, 2025
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
Agentic AI Security Summit 2025
Securing the Age of Agentic AI: Autonomy, Risk, and Resilience As artificial intelligence progresses beyond static models and narrowly defined tasks, the emergence of Agentic AI marks a pivotal shift in how intelligent systems operate. These systems are increasingly capable of autonomous decision-making, continuous learning, and adaptive behavior — posing new opportunities and challenges for technology leaders, researchers, and practiti...
August 19, 2025
Organizer: Cloud Security Alliance
Location: Virtual
Add Favorite
Identity Security Workshop 2025
Effective identity management is vital for securing both organizational and personal data. As zero trust becomes the gold standard for cyber defenses, federal agencies must rethink their security strategies to center around identity—covering both human and machine identities. This transition demands a thorough overhaul of authentication, authorization, data access, auditing, and accountability processes to strengthen government IT infras...
August 19, 2025
Organizer: GovExec 360
Location: Virtual
Add Favorite
Mission-Critical Analytics - Automate S...
Join us for an insightful webinar designed to revolutionize your approach to data analytics! This session will explore the inherent limitations of traditional Excel-based processes and unveil how no-code analytics platforms can dramatically improve the speed and accuracy of your decision-making. During this webinar, attendees will: Evaluate the limitations of Excel-based processes and determine how no-code analytics platforms can enhance decis...
August 19, 2025
Organizer: Alteryx Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search