Acquiring Personal Property in PPMS
Excess property is the first source of supply - learn how to acquire items for your agency using PPMS. This training will provide you with information on who can acquire excess personal property, requirements from the Federal Management Regulation (FMR 102.36), whether reimbursement is required, and how to use the “want list” feature in order to be notified when property is reported on PPMS.gov. We’ll also review the standard...
Automate to Operate: Advancing DHS ...
Join Red Hat on September 4 to learn how Red Hat Ansible Automation Platform is already transforming how Federal teams operate by: Enforcing security at scale through policy-driven automation Eliminating error-prone, manual tasks Standardizing operations across complex environments Accelerating modernization and compliance efforts
September 4, 2025
Organizer:
Red Hat Location:
Webcast
Assume Compromise: Modern Deception Str...
Join us to learn how advanced threats, such as Salt Typhoon, remain undetected for months. Adversaries are leveraging generative AI to mount stealthy attacks that evade traditional security controls. Defenders need an ability to detect threats rapidly and prevent adversary propagation. During this webinar, attendees will learn:How advanced threats are evading detectionWhat the implications are of the assume breach principle of Zero TrustHow mo...
Lessons Learned from Harnessing Healthc...
Join us as we explore real-world examples—like the MGB use case—where generative AI and automation were deployed across departments. We’ll outline the steps successful organizations take before launching LLMs, covering governance, infrastructure readiness and strategies for long-term ROI. During the webinar, attendees will learn how to: Apply insights from real-world healthcare AI deployments Integrate real-time data to suppo...
The Backbone of Modern Government: Sust...
Modern government starts with automation. As digital demands grow and resources stay tight, state and local agencies need a smarter, more sustainable way to deliver services. Join this virtual event to explore how Red Hat Ansible Automation Platform lays the groundwork for long-term modernization, driving efficiency and preparing your IT strategy for future priorities like artificial intelligence and machine learning. Whether you're beginning...
Alliant 2 DPA Training
Who Should Attend: All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how Alliant 2 can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against Alliant 2. This web...
Cyber Resilience in a Turbulent Environ...
Join us as thought leaders from government and industry review how all these factors fit together and ways for agencies to minimize risk even with tight budgets and constrained resources. The cyber universe has always been a challenging space, with threats from hackers, cyber gangs and hostile nation-states. As technology has evolved, new attack surfaces are emerging and the complex environment is becoming increasingly turbulent. This series o...
September 3, 2025
Organizer:
FEDINSIDER Location:
Webcast
Facing the Two-Edged Sword of AI
Join us as thought leaders from government and industry discuss emerging best practices around the safe use of AI and the business infrastructure needed behind it. The use of artificial intelligence (AI) is introducing a paradigm shift in cybersecurity. On the one hand, AI is a powerful asset for cyber resilience, with its ability to automatically update defenses and quickly identify and respond to multi-pronged attacks. On the other hand, bad...
September 3, 2025
Organizer:
FEDINSIDER Location:
Webcast
Defense News Conference 2025
Conference Theme: Deterring Threats from the Indo-Pacific 2025 Panel Topics Include: The State of Shipbuilding & the Navy’s Fleet Emerging Technology Information Warfare Demand for Unmanned Ground Force Posture Reinforcing Alliances
September 3, 2025
Organizer:
Defense News Location:
Washington, DC
GSA GWACs for IT Services-Based Solutio...
This is Delegation of Procurement (DPA) Training for all active GWACs Governmentwide Acquisition Contracts (GWACs) enable federal agencies to buy cost-effective, innovative solutions for information technology (IT) requirements from a Best-In-Class (BIC) designated contract vehicle. Because most, if not all, government agencies have a need to buy IT services and solutions, GSA has made this purchasing convenient through its GWAC Programs. In t...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.