Back to Search Begin New Search Save Search Auto-Notify
Alliant 2 DPA Training
All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how Alliant 2 can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against Alliant 2. This webinar is not open to...
August 20, 2025
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Adopting an Offensive Security Posture:...
Traditional methods of vulnerability assessment are no longer adequate to find exploitable security weaknesses before adversaries. This webcast will examine the evolution and importance of offensive security, emphasizing the shift from reactive to proactive strategies. Join SANS Principal Instructor Jorge Orchilles, and Cobalt SVP of Product Jason Lamar, as they delve into essential concepts, and offer practical guidance for adopting an offens...
August 20, 2025
Organizer: SANS Institute
Location: Webcast
Add Favorite
How to Buy Smarter: An Intro to GSA�s G...
In support of Executive Order 14240, federal agencies are expected to use GSA’s Governmentwide Strategic Solutions blanket purchase agreements for laptops and desktops. These single-award BPAs offer standardized configurations, competitive pricing, and easier ordering through platforms you already use — GSA AdvantageSelect, eBuy, and BPA Holder catalogs. This webinar will help acquisition and IT professionals understand:What the GS...
August 20, 2025
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Weaponized Malware vs. Encryption ...
This webcast will discuss the tactics used by weaponized malware to infiltrate a phone, the advancements and capabilities of forensic surveillance tools, and extracting encrypted data from Signal Messenger. This presentation is essential for security decision-makers and anyone looking to proactively protect the mobile network from the latest malware and digital surveillance tactics. GIAC and ISC2 members can earn CPE credits for attending this...
August 20, 2025
Organizer: RSAC
Location: Webcast
Add Favorite
Certificate of Cloud Security Knowledge...
Certificate of Cloud Security Knowledge v5 | Lectures and Labs Get Certified in Cloud Security with CCSK v5 Plus Certification Training Advance your career and strengthen your cloud security expertise with CCSK Certification Training—a globally recognized certification from the Cloud Security Alliance (CSA). Our comprehensive CCSK v5 Plus Training course fully prepares you for the Certificate of Cloud Security Knowledge (CCSK) exam with...
August 18-20, 2025
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
Identity Security Workshop 2025
Effective identity management is vital for securing both organizational and personal data. As zero trust becomes the gold standard for cyber defenses, federal agencies must rethink their security strategies to center around identity—covering both human and machine identities. This transition demands a thorough overhaul of authentication, authorization, data access, auditing, and accountability processes to strengthen government IT infras...
August 19, 2025
Organizer: GovExec 360
Location: Virtual
Add Favorite
Mission-Critical Analytics - Automate S...
Join us for an insightful webinar designed to revolutionize your approach to data analytics! This session will explore the inherent limitations of traditional Excel-based processes and unveil how no-code analytics platforms can dramatically improve the speed and accuracy of your decision-making. During this webinar, attendees will: Evaluate the limitations of Excel-based processes and determine how no-code analytics platforms can enhance decis...
August 19, 2025
Organizer: Alteryx Government Team at Carahsoft
Location: Webcast
Add Favorite
Agentic AI Security Summit 2025
Securing the Age of Agentic AI: Autonomy, Risk, and Resilience As artificial intelligence progresses beyond static models and narrowly defined tasks, the emergence of Agentic AI marks a pivotal shift in how intelligent systems operate. These systems are increasingly capable of autonomous decision-making, continuous learning, and adaptive behavior — posing new opportunities and challenges for technology leaders, researchers, and practiti...
August 19, 2025
Organizer: Cloud Security Alliance
Location: Virtual
Add Favorite
Precise Human Capabilities: 5 Pillars o...
In today's ever-evolving cyber landscape, simply adding more headcount isn't enough to secure your organization. Cybersecurity leaders face the pivotal challenge of optimizing their most vital asset: their team. Join us as we dive deep into a strategic roadmap that drives peak performance, readiness and resilience: Not just more people, but the right people Effective teamwork in the right environment Mapping human capabilities to risk...
August 19, 2025
Organizer: RangeForce Government Team at Carahsoft
Location: Webcast
Add Favorite
CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
August 11-15, 2025
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
Back to Search Begin New Search