Back to Search Begin New Search Save Search Auto-Notify
ATO in a Box: Simplify Your Compliance
Is your organization struggling with the high costs, lengthy timelines and uncertain results of the traditional Government Authorization to Operate (ATO) process? Join Ask Sage and Chainguard on June 26th for an exclusive session where we'll showcase how Ask Sage's ATO in a Box, powered by Chainguard’s secure containers and AI-driven automation, can revolutionize your compliance journey. Sign up for our virtual workshop to hear from our...
June 26, 2025
Organizer: Ask Sage Government Team at Carahsoft
Location: Virtual
Add Favorite
Tactical Intelligence: Accelerating Nat...
National Security agencies depend on secure, scalable and mission-ready technology to analyze data, detect threats and make rapid, informed decisions. As artificial intelligence/machine learning (AI/ML) becomes increasingly critical to national security operations, deploying and managing it in secure environments is no longer optional, it’s essential. Red Hat OpenShift AI offers a powerful, flexible platform for developing, training and...
June 26, 2025
Organizer: Red Hat Government Team at Carahsoft
Location: Virtual
Add Favorite
Advancing Mission Readiness with AI-Pow...
Achieving mission readiness requires modern, agile tools that keep pace with evolving federal procurement needs. As the federal government advances acquisition reform through technology, compliance pressures, and executive orders mandating streamlined procurement, agencies need AI-powered solutions to stay ahead. Join Icertis and SAP to discover how Next-Generation Contract Writing Systems (CWS) driven by artificial intelligence can:Automate a...
June 26, 2025
Organizer: Icertis Government Team at Carahsoft
Location: Webcast
Add Favorite
Securing Defense Systems with Automatio...
Ready to outpace evolving threats? Join Red Hat on June 26th to learn how Ansible Automation Platform (AAP) is helping the Department of Defense strengthen security, reduce risk and drive innovation across mission-critical operations. From automated patching to zero-trust enforcement, Ansible delivers consistent, scalable security, even in disconnected environments.Key session takeaways: Learn how Red Hat Automation supports secure, disconnect...
June 26, 2025
Organizer: Red Hat Government Team at Carahsoft
Location: Webcast
Add Favorite
National Security Onsite Training
National Security agencies depend on secure, scalable and mission-ready technology to analyze data, detect threats and make rapid, informed decisions. As artificial intelligence/machine learning (AI/ML) becomes increasingly critical to national security operations, deploying and managing it in secure environments is no longer optional, it’s essential. Red Hat OpenShift AI offers a powerful, flexible platform for developing, training and...
June 26, 2025
Organizer: Red Hat Government Team at Carahsoft
Location: Reston, VA
Add Favorite
FAST 2025: Information Technology Categ...
Technology Acquisition, IT Solutions, and Beyond. Join us to sharpen your skills with this back-to-basics educational webinar. We will talk about Multiple Award Schedules, GWACs, hardware, software, OneGov, and more!This event is from 1 - 4 pm ET (3 hours). If you attend you will get 3 CLPs. This event is for government employees only. Please register with your government email address. If you have any questions email, [email protected].
June 26, 2025
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
How to Get Your Unanet Implementation R...
OverviewThis FREE webinar will offer attendees an overview of Unanet ERP implementation best practices, project planning strategies, and compliance considerations specific to government contractors. We’ll explore the key decisions that drive successful implementations, from setting timelines and managing milestones to handling historical data and aligning with compliance requirements. If your system wasn’t configured correctly from...
June 26, 2025
Organizer: Redstone Government Consulting
Location: Webcast
Add Favorite
Mobile Security: The Human Layer is the...
Phishing today isn’t just email. Adversaries are now exploiting SMS, Signal, LinkedIn, QR codes, and more to directly target your people—on the devices they rely on most. These mobile-specific tactics—like smishing and quishing—are designed to exploit human trust, not technical flaws. And they’re working. Protecting users from falling for such schemes is difficult. Threat researchers have seen malicious smishing c...
June 27, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Streamline Your Compliance Journey and...
Compliance is a cornerstone of any modern cybersecurity strategy, especially as agencies and organizations work toward implementing Zero Trust principles. Splunk's Compliance Essentials App simplifies the compliance process by providing tools to assess, monitor, and report on your environment's adherence to regulatory standards like NIST 800-53, RMF, and other frameworks. Join us for this informative webinar, where we’ll demonstrate how...
July 1, 2025
Organizer: Splunk Government Team at Carahsoft
Location: Webcast
Add Favorite
Data Engineering with Databricks
Databricks is coming back to Reston, VA from July 1-2 for an introductory, hands-on course on Databricks Data Engineering. Register now for firsthand training on the components of the Databricks Data Intelligence Platform. Attendees will leverage structured query language (SQL) and Python to define and schedule pipelines that incrementally process new data from a variety of data sources which power analytic applications and dashboards in the P...
July 1-2, 2025
Organizer: Databricks Government Team at Carahsoft
Location: Reston, VA
Add Favorite
Back to Search Begin New Search