The AI-Powered Roadmap to Test Maturity
The pressure to deliver secure, reliable software is immense, yet traditional, ad hoc testing methods often fall short for public sector needs. Join us for an in-depth session exploring the Test Maturity Model designed specifically for public sector teams, providing a clear roadmap to a more efficient, predictable and AI-enhanced quality engineering process. In this webinar, you will discover how to:Evaluate your team’s current testing m...
Ghosts in the Network: APTs, AI and the...
State-sponsored threat actors like those behind Volt Typhoon aren’t relying on zero-days or smash-and-grab exploits—they’re quietly infiltrating critical networks by exploiting public vulnerabilities, using stolen credentials and leveraging built-in system tools to stay undetected for months. These campaigns are designed to evade EDR, avoid raising alarms and exploit blind spots that traditional controls were never designed t...
Data Driven and Citizen Focused: Improv...
Local government agencies are under immense pressure to modernize their operations, but siloed data and outdated legacy systems can be a significant roadblock. This webinar, a collaboration between Snowflake and Avaap, will share strategies for modernizing your data estate to drive better citizen outcomes. You will learn about planning and acceleration techniques that highlight how you can migrate your Workday data into the Snowflake AI Data C...
2025 Effective Market Research (MRAS)
Target Audience: Federal/State/Local Agencies and MilitaryAttention all public sector employees in the contracting and acquisition career field! In GSA's Market Research As a Service (MRAS) Customer Training: Effective Market Research (Fed/Military), you'll learn the importance of market research, how and when to conduct it, and how to get the best results by making your data collection methods more efficient. You'll also delve into the regula...
Zero Trust Training | CCZT
In the dynamic realm of digital security, the necessity for advanced cybersecurity measures is paramount. Progressive companies committed to protecting their digital infrastructure should focus on supporting their employees’ professional growth by enrolling them in the Certificate of Competence in Zero Trust (CCZT) training. This specialized course provides an in-depth exploration of the Zero Trust framework, arming participants with cut...
5G Series Part One: 5G/NextG and AI
Advances in network slicing technology make it possible for service providers to create multiple customized virtual networks within a shared infrastructure environment. By harnessing the power of artificial intelligence (AI) to manage and automate Radio Access Network (RAN) components in cellular networks, the networks can be streamlined and optimized for functionality, performance, and security. For instance, isolating individual network slic...
September 26, 2025
Organizer:
FedInsider Location:
Webcast
5G Series Part Two: Communications for...
The rapid adoption of artificial intelligence (AI) is transforming both the design and use of communication networks. Robust telecom infrastructure — such as private 5G, SD-WAN, and edge computing — is critical for transporting and processing the massive data flows underpinning AI workloads across industries. At the same time, AI is evolving communications itself, powering network automation, predictive analytics, and intelligent m...
September 29, 2025
Organizer:
FedInsider Location:
Webcast
8th National Forum on FOCI
Specifically tailored for FOCI-mitigated companies, this high-level event brings together the most trusted corporate security executives and top outside counsel to share real-world insights and benchmark best practices in today’s rapidly evolving regulatory landscape. With national security scrutiny intensifying and the spotlight firmly on the “Influence” in FOCI, you’ll walk away with critical takeaways and proven stra...
September 29-30, 2025
Organizer:
ACI Location:
Washington, DC
Global Security Exchange (GSX) 2025
Security demands staying a step ahead. Attending Global Security Exchange (GSX), powered by ASIS International, yearly ensures you never fall behind. Be there when the worldwide security industry reconvenes in September to stay informed, connected, and prepared for what’s next.Access CPE-eligible education on the most pressing issues impacting the profession in 2025 and beyond. Build or strengthen professional networks and connections. D...
Education Cyber Resilience: A 4-Part Se...
Join us for an exclusive webinar where Cisco and Proficio will explore today’s top cyber threats in education and how your institution can prepare. From real-world ransomware case studies to practical resilience planning, we’ll highlight proven strategies to strengthen security in both K–12 and higher education. Attend this webinar to gain insight into:Current threat trends in education, including ransomware-as-a-service, AI-...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.