Quantum Leap: Securing Federal Systems...
The threat of "harvest now, decrypt later" attacks is no longer a distant concern—it's a pressing reality for federal and defense agencies. The urgent need to migrate to post-quantum cryptography (PQC) standards has never been clearer. In this virtual session, we will:Explore the collaboration between NIST and the cybersecurity industry through the NCCoE.Discover how agencies can rapidly adopt cryptographic inventory solutions and PQC-en...
Modernizing the Workforce for Mission s...
As agencies look to increase efficiency and accountability, the modernization of back-office systems—like HR, performance management and administrative tools—has become a top priority. This webinar will explore how federal leaders are using emerging technologies like AI and automation to streamline operations, reduce low-value work and better manage data for improved decision-making and oversight. Key Topics:Modernizing HR and admi...
Federal Mobile Driver�s License (mDL) I...
Join our upcoming Federal Mobile Driver’s License (mDL) Industry Day to learn about mDLs: what they are, how they work, and how they can benefit you. At this knowledge-sharing event, industry partners will demonstrate mDL use cases and discuss the state of mDL adoption throughout the U.S. and around the world. We will inform federal agencies that are considering implementing mDL technology on how GSA can support them. Don’t miss th...
Orange County Cybersecurity Conference
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizatio...
July 10, 2025
Organizer:
FutureCon Location:
Garden Grove, CA
The Modern Endpoint - It's Personal
Today’s workforce isn’t tethered to laptops – it’s powered by mobile. It’s often a primary way many employees connect to email and other mission-critical resources but not treated that way from a security standpoint. Traditional Mobile Device Management (MDM) solutions weren’t built to detect advanced threats or align with Zero Trust principles. They offer basic control, but not the telemetry, risk context,...
July 10, 2025
Organizer:
Fedinsider Location:
Webcast
Defense in Depth: Multiple Layers of Pr...
Webcast 4 of 5 in our Special Series—Explore the full lineup here. In today’s complex threat landscape, no single security solution is enough. A modern cybersecurity strategy requires layered, overlapping defenses to detect, prevent, and respond to both external threats and insider risks. Join us for this expert-led webcast to explore how to implement and evolve a Defense-in-Depth (DiD) strategy tailored to your organization...
Service Contract Act Training
The Service Contract Act (SCA) and the regulations implementing SCA are some of the most challenging requirements for contractors and for contracting agencies involved in federal contracts for services. If you are competing for the award of a service contract, or performing a service contract and administering your responsibilities under SCA, this two-day course is critical to understanding SCA and ensuring fair competition and full compliance...
SANS 2025 SOC Survey Webcast & Forum
In 2025, the SANS SOC Survey will extend its detailed inspection of cybersecurity operations centers. By exploring the capabilities and outsourcing; architectures and cloud use; technologies; hiring and staffing; metrics and funding; threat intel; and automation we develop a global picture of the state of SOCs. Key topics examined on this webcast will include:Capabilities that comprise a SOC and what is outsourcedTechnology deployment and sati...
How to Get Your Security Aligned with t...
Katie Arrington, the acting CIO for the Department of Defense, is fiercely determined to enforce the requirements of the Cybersecurity Maturity Model Certification (CMMC), considering it a primary defense against China’s cyber incursions – and one she expects the Defense Industrial Base (DIB) to meet. Among best practices suggested for achieving CMMC is maintaining a comprehensive, accurate asset inventory, because it defines the b...
July 9, 2025
Organizer:
FedInsider Location:
Webcast
Alliant 2 DPA Training
All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how Alliant 2 can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against Alliant 2. This webinar is not open to...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.