The Next Chapter for Federal Workforce...
On June 17, OPM issued guidance aimed at upleveling federal performance management—calling for empowered supervisors, more frequent feedback, and data-driven accountability. The message is clear: annual reviews alone aren’t going to cut it. Federal agencies are reimagining how they evaluate, develop, and support their workforces in response to the recognition that annual performance reviews alone aren’t enough. As expectation...
August 14, 2025
Organizer:
ATARC Location:
Webcast
Certificate of Cloud Security Knowledge...
Certificate of Cloud Security Knowledge v5 | Lectures and Labs Get Certified in Cloud Security with CCSK v5 Plus Certification Training Advance your career and strengthen your cloud security expertise with CCSK Certification Training—a globally recognized certification from the Cloud Security Alliance (CSA). Our comprehensive CCSK v5 Plus Training course fully prepares you for the Certificate of Cloud Security Knowledge (CCSK) exam with...
CISSP | Official ISC2 Training Week
CANCELED
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
SSCP | Official ISC2 Training Week
SSCP | Official ISC2 Training Week 40 CPE’s Official ISC2 SSCP certification provides a comprehensive review of the knowledge required to effectively gain advanced technical skills and knowledge to implement, monitor, and administer IT infrastructure using information security policies and procedures. Participants receive the following with registration: Official ISC2 SSCP Student Training Guide (eBook) 180-Day Access to Class Recordings...
Securing the Future: PQC, Compliance ...
As quantum computing advances, Federal agencies must act quickly to protect their critical systems from future cyber threats.On August 19th, QuSecure and Carahsoft are hosting a webinar to explore the latest developments in Post-Quantum Cryptography (PQC) and how agencies can implement compliance-driven security measures, without overhauling existing infrastructure. Mark your calendar for Federal Government use cases and strategies to:Understa...
Identity Security Workshop 2025
Effective identity management is vital for securing both organizational and personal data. As zero trust becomes the gold standard for cyber defenses, federal agencies must rethink their security strategies to center around identity—covering both human and machine identities. This transition demands a thorough overhaul of authentication, authorization, data access, auditing, and accountability processes to strengthen government IT infras...
August 19, 2025
Organizer:
GovExec 360 Location:
Virtual
Mission-Critical Analytics - Automate S...
Join us for an insightful webinar designed to revolutionize your approach to data analytics! This session will explore the inherent limitations of traditional Excel-based processes and unveil how no-code analytics platforms can dramatically improve the speed and accuracy of your decision-making. During this webinar, attendees will: Evaluate the limitations of Excel-based processes and determine how no-code analytics platforms can enhance decis...
2025 5G Summit - What's Happening Today...
5G networks first made their appearance in 2019, when major telecommunications carriers started rolling them out. Today, more than half the U.S. has 5G coverage, mostly in more densely populated areas. By 2030 it is estimated that more than 90% of mobile data coverage will be 5G. And it has been as significant a change as promised, with download speeds up to 20 Gbps, resulting in very low latency (signal delay) – one reason that streamin...
August 20, 2025
Organizer:
FedInsider Location:
Reston, VA
Alliant 2 DPA Training
All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how Alliant 2 can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against Alliant 2. This webinar is not open to...
Adopting an Offensive Security Posture:...
Traditional methods of vulnerability assessment are no longer adequate to find exploitable security weaknesses before adversaries. This webcast will examine the evolution and importance of offensive security, emphasizing the shift from reactive to proactive strategies. Join SANS Principal Instructor Jorge Orchilles, and Cobalt SVP of Product Jason Lamar, as they delve into essential concepts, and offer practical guidance for adopting an offens...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.