Back to Search Begin New Search Save Search Auto-Notify
Quantum Leap: Securing Federal Systems...
The threat of "harvest now, decrypt later" attacks is no longer a distant concern—it's a pressing reality for federal and defense agencies. The urgent need to migrate to post-quantum cryptography (PQC) standards has never been clearer. In this virtual session, we will:Explore the collaboration between NIST and the cybersecurity industry through the NCCoE.Discover how agencies can rapidly adopt cryptographic inventory solutions and PQC-en...
July 15, 2025
Organizer: Palo Alto Networks Government Team at Carahsoft
Location: Webcast
Add Favorite
Modernizing the Workforce for Mission s...
As agencies look to increase efficiency and accountability, the modernization of back-office systems—like HR, performance management and administrative tools—has become a top priority. This webinar will explore how federal leaders are using emerging technologies like AI and automation to streamline operations, reduce low-value work and better manage data for improved decision-making and oversight. Key Topics:Modernizing HR and admi...
July 15, 2025
Organizer: Federal News Network
Location: Webcast
Add Favorite
Federal Mobile Driver�s License (mDL) I...
Join our upcoming Federal Mobile Driver’s License (mDL) Industry Day to learn about mDLs: what they are, how they work, and how they can benefit you. At this knowledge-sharing event, industry partners will demonstrate mDL use cases and discuss the state of mDL adoption throughout the U.S. and around the world. We will inform federal agencies that are considering implementing mDL technology on how GSA can support them. Don’t miss th...
July 14, 2025
Organizer: General Services Administration (GSA)
Location: Washington, DC
Add Favorite
Orange County Cybersecurity Conference
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizatio...
July 10, 2025
Organizer: FutureCon
Location: Garden Grove, CA
Add Favorite
The Modern Endpoint - It's Personal
Today’s workforce isn’t tethered to laptops – it’s powered by mobile. It’s often a primary way many employees connect to email and other mission-critical resources but not treated that way from a security standpoint. Traditional Mobile Device Management (MDM) solutions weren’t built to detect advanced threats or align with Zero Trust principles. They offer basic control, but not the telemetry, risk context,...
July 10, 2025
Organizer: Fedinsider
Location: Webcast
Add Favorite
Defense in Depth: Multiple Layers of Pr...
Webcast 4 of 5 in our Special Series—Explore the full lineup here. In today’s complex threat landscape, no single security solution is enough. A modern cybersecurity strategy requires layered, overlapping defenses to detect, prevent, and respond to both external threats and insider risks. Join us for this expert-led webcast to explore how to implement and evolve a Defense-in-Depth (DiD) strategy tailored to your organization...
July 10, 2025
Organizer: SANS Institute
Location: Webcast
Add Favorite
Service Contract Act Training
The Service Contract Act (SCA) and the regulations implementing SCA are some of the most challenging requirements for contractors and for contracting agencies involved in federal contracts for services. If you are competing for the award of a service contract, or performing a service contract and administering your responsibilities under SCA, this two-day course is critical to understanding SCA and ensuring fair competition and full compliance...
July 9-10, 2025
Organizer: Professional Services Council
Location: Arlington, VA
Add Favorite
SANS 2025 SOC Survey Webcast & Forum
In 2025, the SANS SOC Survey will extend its detailed inspection of cybersecurity operations centers. By exploring the capabilities and outsourcing; architectures and cloud use; technologies; hiring and staffing; metrics and funding; threat intel; and automation we develop a global picture of the state of SOCs. Key topics examined on this webcast will include:Capabilities that comprise a SOC and what is outsourcedTechnology deployment and sati...
July 9, 2025
Organizer: SANS Institute
Location: Webcast
Add Favorite
How to Get Your Security Aligned with t...
Katie Arrington, the acting CIO for the Department of Defense, is fiercely determined to enforce the requirements of the Cybersecurity Maturity Model Certification (CMMC), considering it a primary defense against China’s cyber incursions – and one she expects the Defense Industrial Base (DIB) to meet. Among best practices suggested for achieving CMMC is maintaining a comprehensive, accurate asset inventory, because it defines the b...
July 9, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Alliant 2 DPA Training
All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how Alliant 2 can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against Alliant 2. This webinar is not open to...
July 9, 2025
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Back to Search Begin New Search