Facing the Two-Edged Sword of AI
Join us as thought leaders from government and industry discuss emerging best practices around the safe use of AI and the business infrastructure needed behind it. The use of artificial intelligence (AI) is introducing a paradigm shift in cybersecurity. On the one hand, AI is a powerful asset for cyber resilience, with its ability to automatically update defenses and quickly identify and respond to multi-pronged attacks. On the other hand, bad...
September 3, 2025
Organizer:
FEDINSIDER Location:
Webcast
Defense News Conference 2025
Conference Theme: Deterring Threats from the Indo-Pacific 2025 Panel Topics Include: The State of Shipbuilding & the Navy’s Fleet Emerging Technology Information Warfare Demand for Unmanned Ground Force Posture Reinforcing Alliances
September 3, 2025
Organizer:
Defense News Location:
Washington, DC
GSA GWACs for IT Services-Based Solutio...
This is Delegation of Procurement (DPA) Training for all active GWACs Governmentwide Acquisition Contracts (GWACs) enable federal agencies to buy cost-effective, innovative solutions for information technology (IT) requirements from a Best-In-Class (BIC) designated contract vehicle. Because most, if not all, government agencies have a need to buy IT services and solutions, GSA has made this purchasing convenient through its GWAC Programs. In t...
Computers for Learning (CFL) for Federa...
This training will examine how federal agencies can help schools and educational non-profits serving some portion of the pre-kindergarten through grade 12 population by directly donating their excess computer equipment. This training will teach you (the federal agency) what your responsibilities are and how to navigate PPMS and the GSA-hosted Computers for Learning (CFL) website. Topics include CFL allocations, CFL requisitions, CFL manual tra...
TechNet Augusta 2025: Empowering Warfig...
Ivanti and Carahsoft invite you to a post-TechNet Augusta 2025 webinar focused on how emerging technologies are enabling Department of Defense agencies to innovate, adapt, and collaborate in support of their mission objectives. This session is designed for DoD professionals seeking to enhance operational effectiveness at the tactical edge through secure and agile mobility solutions. Discussion topics will include:How robust patch management en...
CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
CSSLP | Official ISC2 Training Week
Accelerate Your Path to CSSLP Certification with Live Instructor-Led Training Join ISC2’s Official Instructor-Led CSSLP Training and gain the knowledge needed to excel in the CSSLP certification exam. Designed for professionals who thrive in a structured, interactive learning environment, this comprehensive 5-day course features live instruction, expert guidance, and hands-on exercises to reinforce key secure software development concept...
INTERFACE Boise 2025
Welcome to INTERFACE Boise 2025! IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts...
CMMC: How Proofpoint and Microsoft are...
The Cybersecurity Maturity Model Certification (CMMC) is a Department of Defense (DoD) mandate designed to protect sensitive data across its supply chain. More than a regulatory requirement, CMMC demonstrates an organization’s commitment to national security—enhancing resilience, reducing vulnerabilities and supporting the integrity of operations critical to the defense mission. Proofpoint and Microsoft's human-centric approach can...
Turning Visibility into Action with CDM
Government cybersecurity teams are tasked with understanding all threat vectors and use a wide range of tooling to do so (endpoint, identities, and networks). The Department of Homeland Security’s Continuous Diagnostics and Mitigation (CDM) program is the go-to source for these kinds of tools. However, different tools performing various functions create silos, and in between those disjointed silos lie risks. New tools are being introduce...
August 28, 2025
Organizer:
FedInsider Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.