Automate with Confidence: Remediation w...
State and Local agencies are under increasing pressure to modernize operations while maintaining reliability, security and compliance across complex IT environments. As infrastructure grows more distributed and dynamic, traditional manual processes can no longer keep pace with operational demands. Automation has become a critical enabler for public sector IT teams, but automation alone is not enough. The true value is realized when automation...
OneGov IT Webinar - Government Audience
The OneGov Strategy is our governmentwide approach to modernizing how the federal government procures and manages information technology by acting as one buyer for common IT needs. Through coordinated, governmentwide agreements and direct negotiations with technology providers, OneGov delivers better pricing, consistent terms, stronger security, and faster acquisitions. With more than $500 million in savings and 20 active offers across softwar...
Fraud on the Line: How to Deliver Trust...
Government agencies are the backbone of public service — delivering critical benefits like Social Security, SNAP and Medicaid, caring for our nation’s veterans and managing essential local services. For millions of Americans, the phone remains a lifeline to these services. But today, that lifeline is under attack. Spoofed calls, impersonation scams and spam are at record levels, eroding citizen trust and putting agencies at risk of...
Understanding the Digital Supply Chain...
Join us to explore the digital supply chain of the federal government and how it is evolving from the user to the application. Government workers are working from home, third-party locations, and offices that may not be as strong as their home office. Security is paramount to implement without impacting the digital experience of workers. Understanding how citizens across the United States access federal services requires visibility into intern...
Certificate of Cloud Security Knowledge...
Certificate of Cloud Security Knowledge v5 | Lectures and Labs Get Certified in Cloud Security with CCSK v5 Plus Certification TrainingAdvance your career and strengthen your cloud security expertise with CCSK Certification Training—a globally recognized certification from the Cloud Security Alliance (CSA). Our comprehensive CCSK v5 Plus Training course fully prepares you for the Certificate of Cloud Security Knowledge (CCSK) exam with i...
Beyond the Hype: Building & Operating T...
AI is no longer a science project—it’s a mission reality. As your government agency is shifting from AI experimentation to full implementation, you need a tool that provides total visibility and automated security across your AI supply chain to ensure compliance with federal mandates. Join us, for an exclusive session on using AI Bill of Materials (AI BOMs) to bring transparency and security to your agency's AI lifecycle. This sess...
How the DoW Modernizes Service Manageme...
Discover how the U.S. Air Force and Department of War accelerate mission readiness and operational resilience by modernizing IT service management, procurement, and onboarding with Atlassian's Jira Service Management in secure, compliant cloud environments and how Federal and defense agencies can apply the same patterns to their own high-security missions. Key takeaways Secure, scalable ITSM approaches for DoW and Federal Civilian environ...
Unmasking PRC State Capital in Tech Acq...
Many federal civilian teams are being asked to rapidly assess foreign investment and acquisition risk in critical technologies, particularly semiconductors and advanced manufacturing, where opaque ownership structures can obscure national security concerns. In this webinar, Datenna will walk through the Canyon Bridge acquisition of UK semiconductor company Imagination Technologies to demonstrate how layered offshore vehicles can conceal state...
Shadow Agents, Hidden Secrets, Real Ris...
In government and education environments, AI agents are already showing up in service desks and IT operations to reset passwords and triage tickets, in citizen and student service workflows to answer requests and update records and in security operations to investigate alerts and recommend or trigger response actions. In many environments, these shadow agents can be created in days and have access that rivals a full admin. With modern attack p...
Mission Success Through Zero Trust: Sec...
As Fourth Estate agencies within the Department of Defense (DOD) prepare to transition to the modernized DoDNET, under the Defense Information Systems Agency’s (DISA), the adoption of Zero Trust (ZT) architecture has never been more critical. Zero Trust is the modern approach to cybersecurity and is an essential framework for defending against cyber threats, ensuring secure access, and enabling operational efficiency across distributed e...
February 24, 2026
Organizer:
Fedinsider Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.