Alliant 2 DPA Training
All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how Alliant 2 can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against Alliant 2. This webinar is not open to...
Spring Cyber Solutions Fest 2025: Cloud...
Join us for the Cloud Security Track at SANS Spring Cyber Solutions Fest 2025! This is your opportunity to explore the latest trends and best practices in securing cloud environments. Engage with industry experts as they share insights on emerging threats, effective strategies, and innovative tools designed to enhance your organization’s cloud security posture. This one-day track will feature a variety of discussions, case studies, and p...
Spring Cyber Solutions Fest 2025: Detec...
As cyber threats continue to evolve in complexity and volume, effective detection and response strategies are more crucial than ever. Join us at the Spring Cyber Solutions Fest for the Detection & Response Track, where you’ll gain the tools, techniques, and insights to fortify your organization’s defenses. Whether you're refining existing processes or reimagining your strategy, this track offers invaluable perspectives from ind...
Accelerate AI with Trusted Data
The opportunities in AI are vast, from enhancing citizen services to bolstering national cybersecurity. In fact, there are over 1,200 active and planned AI use cases across the public sector supporting a wide array of missions. For AI to be successful, agencies need trusted data as its foundation. With data spread across cloud and on-premises centers, agencies can benefit from a new secure hybrid model to support their missions. Learning Objec...
March 19, 2025
Organizer:
FedInsider Location:
Webcast
Acquiring Excess Personal Property
This FREE one-hour virtual training focuses on Acquiring Excess Personal Property. We will:Discuss considerations and benefits of acquiring Excess PropertyLearn which entities are eligible to acquire excess propertyReview agency responsibilities & methods of acquiringDemo the request and approval processExplore how to create automated Want List notificationsOnce you complete the training, you will receive (1) one Continuous Learning Point...
Practical Cloud Security: Hands-On Risk...
Practical Cloud Security: Hands-On Risk Management and Compliance is a must-attend training for risk management professionals looking to master the complexities of securing cloud environments and ensuring compliance. This three-day immersive program combines expert-led instruction, hands-on exercises, and real-world case studies to equip you with the skills to identify, mitigate, and report on cloud risks effectively. You’ll learn to eva...
VETS 2 DPA Training
Who Should Attend:All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how the VETS 2 GWAC can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against the VETS 2 GWA...
Spring Cyber Solutions Fest 2025: Emerg...
Join us for the Emerging Technologies Track at SANS Spring Cyber Solutions Fest 2025! If you’re interested in learning about the latest advancements in cybersecurity, this is the perfect opportunity for you. Engage with industry leaders as they present innovative tools and solutions designed to enhance your organization’s security posture. This one-day track will feature a diverse array of use cases, demonstrations, and insights ai...
Breaking ITSM Barriers: A County Govern...
Government agencies are under increased pressure to modernize IT services while staying efficient and responsive. With rising demands and limited resources, outdated systems will only exacerbate issues like slow delivery and frustration for employees and citizens. Join Atlassian and ANB Technology for this live demo of Jira Service Management (JSM), an ITSM/ESM tool used to simplify and expedite service delivery. Our industry experts will cove...
Elements of an Effective Customs Compli...
For companies engaging in international trade, having a customs compliance program is an essential part of their global supply chain. Recognizing that it is cost prohibitive to eliminate risk completely, the goal should be to establish an effective risk management plan. This can be accomplished through oversight of people, process, and systems that adhere to reasonable care standards, demonstrating management’s commitment to compliance....
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.