Atlanta CISO Dinner
Dinner Topic: The Year in Cybersecurity: Lessons Learned and Leadership Priorities for 2026 At the CISO Dinner, security leaders will gather for a frank, forward-looking conversation on the state of cybersecurity as 2025 draws to a close. Together, we’ll reflect on the year’s defining breaches, regulatory shifts, and leadership challenges and exchange insights into what truly warrants attention in 2026. Through shared insights, par...
Denver CISO Holiday Reception
Dinner Topic: Cheers to the Holidays: Celebrating Leadership, Connection, and Community The Denver CISO Community is coming together to close out the year in true holiday style. Join your peers for an evening of great company, passed appetizers, handcrafted beverages, and meaningful conversation as we celebrate another year of cybersecurity leadership and collaboration. This is not your typical networking mixer. The CISO Holiday Reception is d...
Innovation in Action: Creative Strategi...
In the face of tighter staffing constraints and increased budget uncertainty, agencies could be tempted to dial back their efforts to modernize operations and innovate their service delivery. But that’s not happening. Instead, agencies are finding creative ways to remove obstacles to transformation and drive new initiatives forward. Join us online Tuesday, Dec. 9 at 2 p.m. ET/11 a.m. PT to learn how agencies are leaning into transformati...
December 9, 2025
Organizer:
GovLoop Location:
Virtual
LinkedIn Monthly Demos: Elevate Your Wo...
Workforce strategy is more critical than ever for public sector organizations to meet evolving demands, attract top talent, and foster a resilient workforce. Join us for our monthly demos, where we’ll showcase how LinkedIn’s innovative solutions can address your HR challenges—whether it’s talent acquisition, upskilling your team, or enhancing employee engagement. Discover how LinkedIn can empower your organization to:Bu...
How to Avoid the Common Pitfalls of the...
OverviewThis FREE webinar will offer attendees an overview of the Service Contract Act and the regulatory requirements that determine compliance for federal service contractors. The session will explain which contracts are subject to the SCA, how to correctly classify service employees, and what contractors must do to meet wage determination, fringe benefit, and recordkeeping obligations. Participants will gain practical guidance on addressing...
8(a) STARS III GWAC DPA Training
This course provides Delegation of Procurement Authority Training for GSA's 8(a) STARS III Governmentwide Acquisition Contract (GWAC) for IT services. The training defines GSA GWACs, identifies the features and benefits of the 8(a) STARS III GWAC, provides an understanding of 8(a) STARS III ordering procedures and outlines responsibilities of ordering contracting officers. Please note: This training is limited to Federal/Military personnel. Co...
Meeting the AI Implementation Challenge...
Federal agencies face enormous pressure to integrate AI into their operations. But they also face immense challenges to do so securely – both that the AI is accurate and trustworthy, and that it does not introduce new risks. Much of the current risk arises from legacy infrastructure and systems. Agencies’ data pipelines have undergone massive growth, including structured, unstructured and streaming data, yet legacy infrastructure i...
December 9, 2025
Organizer:
FedInsider Location:
Webcast
Luncheon Discussion on Advances in Mili...
Please join BENS members and guests for a luncheon discussion on how the lessons of a small group of world class trauma experts who joined forces with America’s best combat medics to rewrite the rule book on how battlefield medicine can save lives and impact trauma throughout the United States. At the start of the first Gulf War, there had been very little progress in battlefield trauma care since the Civil War. The concepts embodied in...
Ask the CIO: Veterans Affairs
The Department of Veterans Affairs’ top technology priorities encompass cybersecurity, modernization and veteran experience, emphasizing a shift from compliance-driven cybersecurity to a risk-based, assume-breach model anchored in zero trust and operational resilience. Join Federal News Network Executive Editor Jason Miller for an exclusive conversation with the Eddie Pool, the acting assistant secretary for information and technology an...
Securing Gen AI RAG Data using Azure AI...
Large Language Models (LLMs) and Generative AI have inherent limitations, such as outdated knowledge, lack of private data access, and the potential for hallucinations. In this session, we will introduce a strategy for overcoming these challenges: Retrieval-Augmented Generation (RAG). Attendees will see how a GenAI RAG application can provide access to real-time, private data stored in an external knowledge base without needing to fine-tune th...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.