Microsoft Tech Brief: Future-Proof Your...
Join an in-depth session that is designed for IT decision makers and technical implementers who are ready to accelerate their cloud journey. Discover how Azure VMware Solution provides the fastest, most seamless path to the cloud—helping organizations migrate VMware workloads to Microsoft Azure with minimal disruption, while maintaining operational consistency and using existing VMware skills. This session will cover:The strategic and te...
February 3, 2026
Organizer:
Microsoft Location:
Webcast
How Audit Leadership Can Drive Greater...
What you’ll learnAudit leaders face growing pressure to show real impact from data analytics, but most efforts fall short. In fact, 80% of Chief Audit Executives (CAEs) say they need to increase the impact of data analytics within the scope of their audit engagements. The issue isn’t whether analytics can be done, but whether they should be done for maximum value. In this Gartner webinar, discover how leading CAEs are shifting from...
February 3, 2026
Organizer:
Gartner Location:
Webcast
Tech Expo at Fort Meade
Join NCSI for an In-Agency Event Tech Expo for Fort Meade February 3, 2026 Each year NCSI produces over 100 tabletop technology expos at U.S. Department of Defense and Intelligence and Federal Agency locations around the world including the Pentagon, National Security Agency, Ramstein Air Base, and the Defense Intelligence Agency to name just a few. Our technology expos are typically four (4) hours in duration and attract 20 to 50 exhibitors....
GSA GWACs for IT Services-Based Solutio...
This is Delegation of Procurement (DPA) Training for all active GWACs Governmentwide Acquisition Contracts (GWACs) enable federal agencies to buy cost-effective, innovative solutions for information technology (IT) requirements from a Best-In-Class (BIC) designated contract vehicle. Because most, if not all, government agencies have a need to buy IT services and solutions, GSA has made this purchasing convenient through its GWAC Programs. In t...
Tabletop Exercise: Is China and Russia...
Do you know what is inside your software? As software supply chains become increasingly intricate, the threat of foreign adversaries infiltrating critical systems through compromised code has escalated dramatically. With open-source components forming the backbone of modern applications, often with dependency chains 60 levels deep, cybersecurity leaders face a daunting challenge: 6.8% of open-source software is of dubious origin, and over 20%...
The AI Threat: Protecting Education fro...
Across K–12 and higher ed, cybercriminals are leveraging generative AI to launch more targeted, scalable, and convincing attacks than ever before, and email remains a primary point of vulnerability. AI-crafted phishing campaigns, business email compromise (BEC), and other advanced social engineering tactics can disrupt learning, compromise sensitive data, and erode trust. Join the Center for Digital Education and Abnormal AI for a webina...
Microsoft Tech Brief: Migrate and Moder...
Join this event to discover how organizations are driving innovation by migrating and modernizing their Linux, PostgreSQL, and Java workloads on Microsoft Azure. Learn how key factors like flexibility, security, cost effectiveness, and AI readiness are accelerating this shift. Azure experts will share best practices, live demos, and tools to help streamline your migration journey and unlock long-term innovation and scalability.
January 30, 2026
Organizer:
Microsoft Location:
Webcast
Operational Excellence in Government Re...
As Government agencies accelerate their transition from paper-based processes to digital workflows, effective records management has never been more vital. Join us for an interactive event designed specifically for Public Sector professionals, where you’ll engage with the latest trends, solutions and best practices in records management through real-world use cases. Discover how innovative approaches are being applied in practice and par...
CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
Government Innovation California
California continues to lead the nation in digital government, investing heavily in modern infrastructure, data programs, and cyber resilience. Yet agencies still face persistent challenges—from legacy systems and siloed decision-making to workforce skill gaps, fragmented data governance, and increasing pressures around cybersecurity, AI governance, and public trust. Addressing these complex issues requires shared learning, practical ups...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.