Back to Search Begin New Search Save Search Auto-Notify
Acquiring Personal Property in PPMS
Excess property is the first source of supply - learn how to acquire items for your agency using PPMS. This training will provide you with information on who can acquire excess personal property, requirements from the Federal Management Regulation (FMR 102.36), whether reimbursement is required, and how to use the “want list” feature in order to be notified when property is reported on PPMS.gov. We’ll also review the standard...
September 4, 2025
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Automate to Operate: Advancing DHS ...
Join Red Hat on September 4 to learn how Red Hat Ansible Automation Platform is already transforming how Federal teams operate by: Enforcing security at scale through policy-driven automation Eliminating error-prone, manual tasks Standardizing operations across complex environments Accelerating modernization and compliance efforts
September 4, 2025
Organizer: Red Hat
Location: Webcast
Add Favorite
Assume Compromise: Modern Deception Str...
Join us to learn how advanced threats, such as Salt Typhoon, remain undetected for months. Adversaries are leveraging generative AI to mount stealthy attacks that evade traditional security controls. Defenders need an ability to detect threats rapidly and prevent adversary propagation. During this webinar, attendees will learn:How advanced threats are evading detectionWhat the implications are of the assume breach principle of Zero TrustHow mo...
September 3, 2025
Organizer: Acalvio Government Team at Carahsoft
Location: Webcast
Add Favorite
Lessons Learned from Harnessing Healthc...
Join us as we explore real-world examples—like the MGB use case—where generative AI and automation were deployed across departments. We’ll outline the steps successful organizations take before launching LLMs, covering governance, infrastructure readiness and strategies for long-term ROI. During the webinar, attendees will learn how to: Apply insights from real-world healthcare AI deployments Integrate real-time data to suppo...
September 3, 2025
Organizer: John Snow Labs Government Team at Carahsoft
Location: Webcast
Add Favorite
The Backbone of Modern Government: Sust...
Modern government starts with automation. As digital demands grow and resources stay tight, state and local agencies need a smarter, more sustainable way to deliver services. Join this virtual event to explore how Red Hat Ansible Automation Platform lays the groundwork for long-term modernization, driving efficiency and preparing your IT strategy for future priorities like artificial intelligence and machine learning. Whether you're beginning...
September 3, 2025
Organizer: Red Hat Government Team at Carahsoft
Location: Webcast
Add Favorite
Alliant 2 DPA Training
Who Should Attend: All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how Alliant 2 can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against Alliant 2. This web...
September 3, 2025
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Cyber Resilience in a Turbulent Environ...
Join us as thought leaders from government and industry review how all these factors fit together and ways for agencies to minimize risk even with tight budgets and constrained resources. The cyber universe has always been a challenging space, with threats from hackers, cyber gangs and hostile nation-states. As technology has evolved, new attack surfaces are emerging and the complex environment is becoming increasingly turbulent. This series o...
September 3, 2025
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Facing the Two-Edged Sword of AI
Join us as thought leaders from government and industry discuss emerging best practices around the safe use of AI and the business infrastructure needed behind it. The use of artificial intelligence (AI) is introducing a paradigm shift in cybersecurity. On the one hand, AI is a powerful asset for cyber resilience, with its ability to automatically update defenses and quickly identify and respond to multi-pronged attacks. On the other hand, bad...
September 3, 2025
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Defense News Conference 2025
Conference Theme: Deterring Threats from the Indo-Pacific 2025 Panel Topics Include: The State of Shipbuilding & the Navy’s Fleet​ Emerging Technology ​ Information Warfare​​ Demand for Unmanned​​ Ground Force Posture​​ Reinforcing Alliances​​​
September 3, 2025
Organizer: Defense News
Location: Washington, DC
Add Favorite
GSA GWACs for IT Services-Based Solutio...
This is Delegation of Procurement (DPA) Training for all active GWACs Governmentwide Acquisition Contracts (GWACs) enable federal agencies to buy cost-effective, innovative solutions for information technology (IT) requirements from a Best-In-Class (BIC) designated contract vehicle. Because most, if not all, government agencies have a need to buy IT services and solutions, GSA has made this purchasing convenient through its GWAC Programs. In t...
September 2, 2025
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Back to Search Begin New Search