The Redstone Edge Conference 2025
The government contracting industry is ever-changing and evolving, and the Redstone Edge Conference was developed with that in mind. Each year, we bring you topics at this industry’s forefront. Our goal is to provide you with the tools and knowledge to succeed in this highly regulated and complicated industry. Our one-day conference consists of morning panel discussions on topics of interest to all government contractors as well as after...
Hot Topics in Cybersecurity Day 2: Main...
After seeing first-hand the massive effects of supply chain disruption during the pandemic and the impact of accidentally using infected open-source software by software providers, state and local governments are aware of the risks of supply chain disruptions due to a cyber attack. Agencies have to broaden their thinking about where risks may be encountered. For instance, cybersecurity experts see the Salt Typhoon incursion into several U.S. t...
September 17, 2025
Organizer:
FedInsider Location:
Webcast
Cyber Defenders Workshop Part Two
Cyber Defenders Workshop Part Two will bring together government and industry leaders to explore strategies for mitigating risk, staying ahead of evolving cyber threats, and protecting critical infrastructure and personal devices. As the federal government prioritizes cybersecurity, IT teams must balance modernizing legacy systems with ensuring cyber defenders are properly trained and equipped to navigate today’s complex threat landscape.
September 17, 2025
Organizer:
Nextgov/FCW Location:
Washington, DC
Alliant 2 DPA Training
All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how Alliant 2 can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against Alliant 2. This webinar is not open to...
Exploiting the Everyday: Adversaries' A...
As IT systems and online services rapidly evolve, the risks facing organizations have expanded significantly. This shift is reflected in a changing threat landscape, where adversaries increasingly exploit cloud platforms and SaaS applications as part of their campaign playbooks. In this webinar, we'll explore the wide range of services, applications and tools leveraged by threat actors to bypass traditional defenses, with a focus on the ...
Yes, And...5 Expert Tips for Collaboration
Forget boring panels and stiff handshakes — this is collaboration with a twist. Inspired by the improv mantra “Yes, And…,” we’re bringing together public-sector pros, creative thinkers and team-building enthusiasts for an evening of laughter, learning and lively networking. Whether you’re a government guru or a teamwork rookie, you’ll leave with fresh strategies, new connections and maybe even a few pi...
September 17, 2025
Organizer:
GovLoop Location:
Washington, DC
Transforming Citizen Experience with AI...
Join Google Public Sector, Carahsoft, TTEC Digital & Botcopy for an engaging half-day lunch & learn focused on how public sector organizations are leveraging AI and cloud technologies to reimagine the citizen experience. This session will showcase practical innovations that are helping government agencies streamline services, improve response times, and enhance engagement across every touchpoint. What you'll learn:How AI-powered contac...
Building the Zero Trust Framework on El...
In today’s threat landscape, public sector organizations must adopt a proactive and adaptive security posture. This session explores how to architect a scalable Zero Trust framework by integrating Elastic’s powerful observability and analytics platform with Gigamon’s deep network telemetry. During this webinar, attendees will learn:How to leverage enriched network metadata to gain real-time visibility, detect lateral movement...
Containers Without Complexity: The Red...
Across Canada, government agencies are embracing new ways to modernize operations, innovate faster and build citizen trust. At the center of this shift is containerization, enabling IT teams to move beyond legacy systems and unlock the agility needed for today's digital demands. Red Hat OpenShift simplifies this transformation by providing a unified platform to deploy, secure and manage Kubernetes containers at scale, empowering the Canadian p...
Uncover Emerging Narratives in Real Time
Join this webinar, to explore how narrative analysis is reshaping the fight against cognitive warfare. See how Argus, Accrete’s AI-powered social media influence tool, empowers analysts to detect, decode and counter emerging narratives—strengthening cognitive security and enabling smarter, faster decision-making. During this webinar, attendees will learn:Why visibility is the foundation of cognitive advantageHow Argus maps sentimen...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.