Back to Search Begin New Search Save Search Auto-Notify
Government Customer Experience & Engage...
As agencies strive to meet rising public expectations and a waning trust in public service, the critical intersection of technology, culture, and strategy has never been more important. Customer experience (CX) is at the forefront of the movement to enhance service delivery and revolutionize citizen engagement. But what are the best practices for developing user engagement? How can we harness not only technology, but people, to elevate the gov...
June 3, 2025
Organizer: GovExec 360
Location: Washington, DC
Add Favorite
Endpoint Security in Higher Education:...
Higher education institutions face an increasingly complex threat landscape, with endpoints—laptops, mobile devices, IoT, and research systems—being prime targets for cyberattacks. As IT professionals, securing these diverse endpoints while maintaining academic accessibility is a constant challenge. This webinar will dive into advanced endpoint security strategies, including Zero Trust architecture, Endpoint Detection and Response...
June 3, 2025
Organizer: CyberArk Government Team at Carahsoft
Location: Webcast
Add Favorite
Identity Gaps are the New Insider Threat
When legitimate credentials are used for illegitimate purposes, traditional defenses fall short. That’s the reality government agencies are facing—across state, local, tribal, and territorial levels. The challenge isn’t just keeping bad actors out anymore; it’s spotting them when they’re already in, using real accounts to move laterally, elevate privileges, and quietly dig deeper. This is where SailPoint solutions...
June 3, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
OASIS+ Delegation of Procurement Author...
OASIS+ Delegation of Procurement Authority (DPA) Training gives procurement staff access to the new OASIS+ contracts and teaches best practices for task order issuance. The DPA clearly delineates the roles and responsibilities between the GSA contracting officer and the ordering contracting officer and complies with the Office of Management and Budget's executive agent designation to GSA. Warranted OCOs (a contracting officer appointed pursuan...
June 3, 2025
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Acquiring Personal Property in PPMS
Excess property is the first source of supply - learn how to acquire items for your agency using PPMS. This training will provide you with information on who can acquire excess personal property, requirements from the Federal Management Regulation (FMR 102.36), whether reimbursement is required, and how to use the “want list” feature in order to be notified when property is reported on PPMS.gov. We’ll also review the standard...
June 3, 2025
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
GSA GWACs for IT Services-Based Solutio...
This is Delegation of Procurement (DPA) Training for all active GWACs Governmentwide Acquisition Contracts (GWACs) enable federal agencies to buy cost-effective, innovative solutions for information technology (IT) requirements from a Best-In-Class (BIC) designated contract vehicle. Because most, if not all, government agencies have a need to buy IT services and solutions, GSA has made this purchasing convenient through its GWAC Programs. In t...
June 3, 2025
Organizer: General Services Administration
Location: Webcast
Add Favorite
Data is the New Jackpot: Unlocking Grow...
In today’s competitive gaming landscape, data isn’t just a byproduct of operations — it’s your biggest asset. Join us to learn how leading tribal casinos are transforming their data into a strategic advantage and hitting the jackpot on business performance. This webinar will show how tribal casinos can use Tableau’s powerful AI capabilities for reporting and analytics, unlocking insights that drive revenue, deepen...
June 3, 2025
Organizer: Tableau Government Team at Carahsoft
Location: Webcast
Add Favorite
Securing IT/OT Convergence: Lessons fro...
The convergence of IT and OT within the Department of Defense (DOD) and the federal government presents unique cybersecurity challenges, particularly in protecting critical infrastructure and industrial control systems. As highlighted in the latest CrowdStrike Global Threat Report, adversaries are increasingly targeting operational technology environments, exploiting vulnerabilities in industrial control systems and the Extended Internet of Th...
June 3, 2025
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Next Generation HSM: Modernize Security...
How much is your legacy Hardware Security Module (HSM) infrastructure holding you back? Legacy HSMs were not designed for the evolving demands of today’s federal IT environments. Burdened by manual operations, limited scalability, and outdated architectures, these systems are costly to maintain, unable to meet the requirements of Zero Trust, and difficult to integrate with modern federal IT strategies. Additionally, many legacy HSMs are...
June 4, 2025
Organizer: Fortanix Government Team at Carahsoft
Location: Webcast
Add Favorite
Overcoming Infrastructure Challenges: H...
When Baltimore’s Francis Scott Key bridge collapsed in March 2024 after it was struck by a container ship, it provided a harrowing – and deadly – demonstration of the fragility of aging U.S. infrastructure. The danger of aging infrastructure is compounded by workforce shortages, funding constraints and increasing demands, pushing transportation agencies at all levels—whether a municipality, city, county, or state depart...
June 4, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Back to Search Begin New Search