Back to Search Begin New Search Save Search Auto-Notify
Harnessing Generative AI: Transforming...
As federal agencies confront increasingly sophisticated cyber threats, the need for robust cybersecurity programs have never been greater. Generative AI offers a transformative opportunity to enhance key aspects of federal cybersecurity, including threat detection, vulnerability management, security operations, and compliance activities. Moving beyond traditional, human-driven analyses and pre- defined rules, Generative AI enables capabilities...
April 10, 2025
Organizer: ATARC
Location: Webcast
Add Favorite
Cyber Resilience with Forward Networks:...
Are you looking to stay ahead of:Latest cybersecurity threatsBest PracticesCutting-edge technologiesIf you answered yes to any of the above, join us for an exclusive 5-part webinar series covering key topics in cyber risk management, threat detection and advanced security strategies with the opportunity to earn 1 CPE credits per webinar! March 13 - Cyber Data Call Handling March 27 - Cyber Threat PrioritizationApril 10 - Zero Trust Network Val...
April 10, 2025
Organizer: Forward Networks Government Team at Carahsoft
Location: Webcast
Add Favorite
The Future of ID Management: Public Sec...
As the public sector continues to embrace digital transformation and zero trust security environments, the need for robust identity management is paramount. “The Future of Identity Management: Public Sector Best Practices” virtual workshop will explore cutting-edge strategies and solutions that ensure secure and efficient identity verification and management. Attendees will gain an understanding of how to implement best practices t...
April 10, 2025
Organizer: Digital Government Institute
Location: Virtual
Add Favorite
Harnessing AI & ML for Smarter Cybersecurity
As cyber threats grow more sophisticated, agencies must move beyond static defenses to intelligence-driven security. And while AI and machine learning (ML) enhance efficiency by detecting anomalies, forecasting risks, and accelerating response, agencies still need to address concerns about verification of alert evidence and suggested response actions. AI-powered security integrates with existing tools like Security Information and Event Manage...
April 10, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
PSHC Office Hours: Blanket Purchase Agr...
A GSA Multiple Award Schedule Blanket Purchase Agreement (BPA) is an agreement established by a government buyer with a Schedule contractor to fill repetitive needs for supplies or services (FAR 8.405-3). Buyers reduce administrative burden by eliminating repetitive activities such as searching for sources and needing to prepare new, complete requests for quotes for each Schedule order. Join us this month to learn how BPAs can help you streaml...
April 10, 2025
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
SecureWorld Philadelphia
Join your regional cybersecurity community for high-quality, affordable training and collaboration. Earn 12-18 CPE credits through 30+ educational sessions learning from local and nationally recognized industry leaders. Attend featured keynotes, panel discussions, breakout sessions, and solution vendor displays—all while networking with peers in InfoSec.
April 9-10, 2025
Organizer: SecureWorld
Location: King of Prussia, PA
Add Favorite
Lookout Mobile Endpoint Security Hands-...
Threat actors want to access data that is now flowing between devices, apps, and networks via the cloud. Mobile devices, crucial for access and authentication into the services that host this data, are often the easiest to compromise - but they’re often the least protected despite the unique nature of their operating systems and significant risk they’re exposed to. Lookout provides a comprehensive solution that continuously grants...
April 9, 2025
Organizer: Lookout
Location: Virtual
Add Favorite
Strengthen & Automate Your Cyber Risk M...
The federal government is well aware of the dangers of cyber attacks. In December 2024, Chinese hackers penetrated a Treasury Department vendor and accessed more than 3,000 unclassified files related to high-ranking officials. Just a month earlier, researchers had discovered Salt Typhoon, a Chinese attack breaching eight U.S. telecom providers; the attack began as much as two years ago and still infects the companies’ networks. These and...
April 9, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Strengthen & Automate Your Cyber Risk M...
The federal government is well aware of the dangers of cyber attacks. In December 2024, Chinese hackers penetrated a Treasury Department vendor and accessed more than 3,000 unclassified files related to high-ranking officials. Just a month earlier, researchers had discovered Salt Typhoon, a Chinese attack breaching eight U.S. telecom providers; the attack began as much as two years ago and still infects the companies’ networks. These and...
April 9, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
SecureWorld Toronto
Join your regional cybersecurity community for high-quality, affordable training and collaboration. Earn 6-12 CPE credits through 15+ educational sessions learning from local and nationally recognized industry leaders. Attend featured keynotes, panel discussions, breakout sessions, and solution vendor displays—all while networking with peers in InfoSec.
April 8, 2025
Organizer: SecureWorld
Location: Toronto, CA
Add Favorite
Back to Search Begin New Search