Government Customer Experience & Engage...
As agencies strive to meet rising public expectations and a waning trust in public service, the critical intersection of technology, culture, and strategy has never been more important. Customer experience (CX) is at the forefront of the movement to enhance service delivery and revolutionize citizen engagement. But what are the best practices for developing user engagement? How can we harness not only technology, but people, to elevate the gov...
June 3, 2025
Organizer:
GovExec 360 Location:
Washington, DC
Endpoint Security in Higher Education:...
Higher education institutions face an increasingly complex threat landscape, with endpoints—laptops, mobile devices, IoT, and research systems—being prime targets for cyberattacks. As IT professionals, securing these diverse endpoints while maintaining academic accessibility is a constant challenge. This webinar will dive into advanced endpoint security strategies, including Zero Trust architecture, Endpoint Detection and Response...
Identity Gaps are the New Insider Threat
When legitimate credentials are used for illegitimate purposes, traditional defenses fall short. That’s the reality government agencies are facing—across state, local, tribal, and territorial levels. The challenge isn’t just keeping bad actors out anymore; it’s spotting them when they’re already in, using real accounts to move laterally, elevate privileges, and quietly dig deeper. This is where SailPoint solutions...
June 3, 2025
Organizer:
FedInsider Location:
Webcast
OASIS+ Delegation of Procurement Author...
OASIS+ Delegation of Procurement Authority (DPA) Training gives procurement staff access to the new OASIS+ contracts and teaches best practices for task order issuance. The DPA clearly delineates the roles and responsibilities between the GSA contracting officer and the ordering contracting officer and complies with the Office of Management and Budget's executive agent designation to GSA. Warranted OCOs (a contracting officer appointed pursuan...
Acquiring Personal Property in PPMS
Excess property is the first source of supply - learn how to acquire items for your agency using PPMS. This training will provide you with information on who can acquire excess personal property, requirements from the Federal Management Regulation (FMR 102.36), whether reimbursement is required, and how to use the “want list” feature in order to be notified when property is reported on PPMS.gov. We’ll also review the standard...
GSA GWACs for IT Services-Based Solutio...
This is Delegation of Procurement (DPA) Training for all active GWACs Governmentwide Acquisition Contracts (GWACs) enable federal agencies to buy cost-effective, innovative solutions for information technology (IT) requirements from a Best-In-Class (BIC) designated contract vehicle. Because most, if not all, government agencies have a need to buy IT services and solutions, GSA has made this purchasing convenient through its GWAC Programs. In t...
Data is the New Jackpot: Unlocking Grow...
In today’s competitive gaming landscape, data isn’t just a byproduct of operations — it’s your biggest asset. Join us to learn how leading tribal casinos are transforming their data into a strategic advantage and hitting the jackpot on business performance. This webinar will show how tribal casinos can use Tableau’s powerful AI capabilities for reporting and analytics, unlocking insights that drive revenue, deepen...
Securing IT/OT Convergence: Lessons fro...
The convergence of IT and OT within the Department of Defense (DOD) and the federal government presents unique cybersecurity challenges, particularly in protecting critical infrastructure and industrial control systems. As highlighted in the latest CrowdStrike Global Threat Report, adversaries are increasingly targeting operational technology environments, exploiting vulnerabilities in industrial control systems and the Extended Internet of Th...
Next Generation HSM: Modernize Security...
How much is your legacy Hardware Security Module (HSM) infrastructure holding you back? Legacy HSMs were not designed for the evolving demands of today’s federal IT environments. Burdened by manual operations, limited scalability, and outdated architectures, these systems are costly to maintain, unable to meet the requirements of Zero Trust, and difficult to integrate with modern federal IT strategies. Additionally, many legacy HSMs are...
Overcoming Infrastructure Challenges: H...
When Baltimore’s Francis Scott Key bridge collapsed in March 2024 after it was struck by a container ship, it provided a harrowing – and deadly – demonstration of the fragility of aging U.S. infrastructure. The danger of aging infrastructure is compounded by workforce shortages, funding constraints and increasing demands, pushing transportation agencies at all levels—whether a municipality, city, county, or state depart...
June 4, 2025
Organizer:
FedInsider Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.