Alliant 2 DPA Training
All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how Alliant 2 can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against Alliant 2. This webinar is not open to...
PPMS Familiarization
This training reviews the basic features of the Personal Property Management System (PPMS), which is GSA’s web-enabled computer system for reporting, acquiring, and managing excess and surplus personal property. The class discusses how to get a PPMS user ID, logging into PPMS, program points of contact, and navigating the PPMS homepage. This free 1-hour virtual training will be held on Wednesday, June 25, 2025 at 1:00 p.m. EST. This trai...
Gen AI Innovations in Disconnected Envi...
Join Red Hat on June 25th for an exclusive virtual workshop focused on accelerating innovation in Generative AI (GenAI) for mission-critical environments. Red Hat AI delivers a robust, flexible platform enabling the Department of Defense to build, train, and deploy GenAI models optimized for disconnected, intermittent, and limited (DIL) environments. Key Session Takeaways:Discover how Red Hat AI enables fine-tuning and performance optimization...
Virtual AI Forum: Leading with Responsible AI
Artificial Intelligence in healthcare isn’t on the horizon, it’s already here. From clinical decision-making to operational strategy and cyber defense, AI is transforming how healthcare operates at every level. But while the technology accelerates, the most critical questions remain:Who will lead this transformation, and how do we ensure it’s done responsibly?Join us for Leading with Responsible AI, a three-day virtual Health...
June 23-25, 2025
Organizer:
Clearwater Location:
Webcast
SECURE Washington, DC
Join cybersecurity professionals from across the public and private sectors at ISC2 SECURE Washington, DC, returning in person on June 24, 2025, at the Ronald Reagan Building and Convention Center. This must-attend event offers a full day of expert insights, discussions and networking on the latest cybersecurity challenges shaping the profession. Register early and save—early bird pricing ends May 13! Cybersecurity is at a turning point...
June 24, 2025
Organizer:
ISC2 Location:
Washington, DC
Ansible Automates: DC
Ansible Automates is a full-day in-person event with Ansible� experts and industry thought leaders presenting trending automation topics that will help your organization deliver the right automation strategy and achieve success in your AI adoption goals. Red Hat� Ansible Automation Platform supports extensive possibilities and is designed with hybrid cloud infrastructure in mind. It is a flexible, scalable, and multifaceted automation solution...
State of SaaS Security
The State of SaaS Security: Trends and Insights for 2025-26, commissioned by Valence in partnership with the Cloud Security Alliance, reveals a critical inflection point in SaaS security. While 86% of organizations now prioritize SaaS security with 76% increasing budgets, significant challenges persist that threaten enterprise security postures. Survey data from 420 IT and security professionals highlights persistent visibility gaps, with 55%...
Government Marketing - Beyond the Playbook
Join us for a candid, no-nonsense discussion on the realities of government marketing in today’s environment. Led by a team of industry veterans, this complimentary online hour-long session dives deep into the strategies, missteps, and evolving dynamics shaping marketing success in the public sector. Over lunch, we’ll unpack the hard truths—what works, what doesn’t, including how to navigate shifting policies and procur...
How CA State Agencies Leverage Forescou...
Please join Carahsoft and Forescout for an informative and interactive session that will help you better understand how the use cases and capabilities of Forescout can help your California agency gain total device visibility and protection. During this session, you will learn how Forescout enables:Total device visibility - including rogue device detection and up to 800 data points per deviceCompliance readiness and enforcement - deep visibilit...
The Strategy Behind Meeting CMMC Requirements
The purpose of the Cybersecurity Maturity Model Certification is to have in place the security and privacy controls that give information systems greater resilience in the face of a wide range of dangers, including malicious attacks, natural disasters, structural shortcomings, human error, and hostile nation-state surveillance. The catalog of controls is laid out in the National Institute of Standards and Technology Special Publication 800-53...
June 24, 2025
Organizer:
FedInsider Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.