Okta Identity Process Automation
Join us on November 21st for networking and insights from Okta experts on how to do more with less by automating your identity processes using Okta Identity Governance and Okta Workflows. Our Okta experts will shed light on strategies to enhance user experiences for both internal and external customers. The knowledge shared will empower you to streamline processes, bolster security, and foster seamless collaboration in your organization. Durin...
Internal Auditing for the Defense Contractor
The Internal Auditing for the Defense Contractor webinar CPE training program is designed to provide participants with a comprehensive understanding of internal auditing practices needed as a DoD Contractor. The event focuses on meeting compliance requirements and equipping auditors with the necessary skills and knowledge to effectively navigate the regulatory landscape. Throughout the event, participants will gain a deep understanding of the...
Federal Low-Code App Engine Innovation...
Join us in-person for a full day hands-on Low-Code App Engine Innovation Workshop to see how organizations are re-imagining their approach to automation and app development with ServiceNow's Creator Workflows. Learn how to boost productivity at scale by building high-value low-code mission apps with App Engine. Whether you're a pro developer of any level looking to streamline repetitive tasks, a low-code business analyst looking for wa...
Zero Trust Summit 2024
CSA’s third annual Virtual Zero Trust Summit will provide insights and resources needed to understand and implement the core concepts of Zero Trust. Featuring prominent industry leaders such as John Kindervag, the founder of Zero Trust philosophy, this two-day Summit will deliver critical insights, tools, and best practice guidance for developing and implementing a Zero Trust security strategy. Zero Trust experts, innovators and analysts...
Artificial Intelligence to Enhance Cybe...
In the rapidly evolving domain of cyber security, artificial intelligence (AI) stands as a pivotal force with dual capabilities: as an enhancement of agency security efforts and potential facilitator of offensive cyber-attacks. This virtual workshop will cover the multifaceted role of AI in cyber security, illustrating both its defensive and offensive capabilities. Workshop attendees will gain insights into the latest AI-powered cybersecurity...
The GovExec Cybersecurity Futures Forum
The cybersecurity landscape for U.S. federal and defense sectors is evolving rapidly amid technological advancements and increasingly sophisticated threats. These organizations face unprecedented challenges in safeguarding sensitive data and critical infrastructure from adversaries who exploit evolving vulnerabilities. As federal networks expand into cloud computing, IoT, and interconnected systems, the attack surface broadens, necessitating r...
November 20, 2024
Organizer:
GovExec Location:
McLean, VA
OASIS+ Delegation of Procurement Author...
OASIS+ Delegation of Procurement Authority (DPA) Training gives procurement staff access to the new OASIS+ contracts and teaches best practices for task order issuance. The DPA clearly delineates the roles and responsibilities between the GSA contracting officer and the ordering contracting officer and complies with the Office of Management and Budget's executive agent designation to GSA. Warranted OCOs (a contracting officer appointed pursuan...
ATRW Leveraging MAS IT for Government E...
This session will provide a comprehensive guide to GSA’s Multiple Award Schedule (MAS) Information Technology (IT) Category, emphasizing its wide-ranging capabilities. Attendees will learn how MAS IT evolved from the IT Schedule 70 we all knew and loved.
De-Risk Financial ERP Transformation wi...
ERP migrations are massive, multi-billion dollar projects that can consume a public servant’s life. They come with high pressure and risk: in fact, only 13% of government tech projects over $6 million succeed. The good news? Celonis can support that deficit. Join our webinar and discover how your agency can de-risk projects to ensure better process re-engineering by starting early and intentionally. Celonis tactically excels at system tr...
No Alert Left Behind
Many major cyber incidents have started as low-level alerts — the kind that often don't get investigated because your SOC can't get to everything. But recent advances in threat detection and response have put 100% investigation in reach. Join experts at our No Alert Left Behind - Get to 100% with GenAI virtual workshop on November 20 to learn proven strategies to level up your SOC to investigate every alert that comes in.Space is limited...
November 20, 2024
Organizer:
Trellix Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.