The Cloud’s Role in Public Safety ...
When a disaster strikes, the infrastructure needed to support recovery usually is hit hard, as well. Tornados take down cell towers, buildings, tear up roads; floods damage water treatment plants, homes, bridges; wildfires destroy everything in their path. First responders – the people going into harm’s way to save people and property – need as much information as possible about the conditions they will face. The U.S. Fire Ad...
July 23, 2025
Organizer:
FedInsider Location:
Webcast
Exploring AI’s Impact on Your Governmen...
Artificial intelligence (AI) has seemingly touched almost every aspect of our lives in just a few short years. It’s no surprise, then, that technology is already changing the way we do our jobs. But what remains undefined is exactly how things will change. We invite you to join your public-sector peers in person for a networking discussion on the impact of AI on government careers. You’ll hear from career experts and government tho...
July 23, 2025
Organizer:
GovLoop Location:
Washington, DC
Secure Software Delivery with GitLab an...
The U.S. Army faces growing pressure to modernize software development and delivery practices while maintaining the highest levels of security, compliance and operational resilience. Join Chainguard, GitLab and CDW-G for an informative technical exchange on how the Army can reduce risk in the software supply chain by eliminating CVEs in their open source software dependencies, streamline the software development lifecycle and align with Army c...
AI Acquisition Forum 2025
Use of AI in government agencies requires that agencies manage the risks and performance and implement structures to govern and manage the process of acquiring AI. This was addressed by OMB in "Advancing the Responsible Acquisition of Artificial Intelligence in Government (M-24-18). The latest Executive Order is on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence to strengthen AI safety, security, equity, privac...
July 23, 2025
Organizer:
ACT-IAC Location:
McLean, VA
Smarter Workflows for Federal Agencies:...
Join us for an exclusive webinar to explore how Google Workspace empowers federal agencies to work smarter and faster. From real-time collaboration and intelligent automation to built-in data analysis and streamlined communication, Workspace is designed to simplify complexity and unlock higher performance at every level. See how AI-driven tools are eliminating repetitive tasks, enabling data-informed decision-making, and enhancing mission impa...
Mobile Device Investigator Training
ADF Solutions invites you to a free, hands-on training session for Mobile Device Investigator® (MDI)—our field-proven mobile forensics tool trusted by investigators nationwide. Attendees will earn an MDI User Certificate + FREE 6-month license upon completion of training! We are pleased to be offering the training live in Reston, VA! Join our expert instructors for a full day of live, interactive training where you'll gain the skills to...
Revolutionizing Government with Google'...
Join Carahsoft, Google Public Sector, and Knexus for your opportunity to discover the groundbreaking advancements made with Generative AI in the public sector. A year after launching the GenAI Revolution with Knexus and our government partners, we're ready to share the latest tangible successes. This webinar is more than a lookback; it offers a direct view into the transformative power of AI in government technology. We'll showcase three cutti...
The Cloud’s Role in Public Safety ...
Data analytics demonstrate their value for both public safety and emergency management every day. The National League of Cities, for example, promotes the usefulness of Data-Informed Community Engagement (DICE), pairing crime data and analytics with community-driven risk concerns. Data-driven policing has been in use since the 1970s, but the advent of the cloud and edge computing has put it at the fingertips of law enforcement. Similarly, emer...
July 22, 2025
Organizer:
FedInsider Location:
Webcast
Stopping Credential-Based Attacks and L...
Phishing-resistant access is now a mandate, not a nice-to-have. But most federal authentication workflows still rely on passwords or other shared secrets that attackers can easily exploit. These compromises often become the entry point for lateral movement inside networks, escalating the impact of a breach. Join this webinar to learn how Beyond Identity helps agencies strengthen both device and identity assurance without introducing user frict...
Securing Government Systems at Scale: H...
Government agencies at every level—federal, state, and local—face mounting cybersecurity challenges: increasingly sophisticated threats, evolving compliance mandates, limited IT resources, and ongoing pressure to ensure the continuity of public services. Join Cimcor for this timely and informative webinar to explore how CimTrak empowers government entities to take control of their IT environments and respond swiftly to unexpected o...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.