GSA GWACs for IT Services-Based Solutio...
This is Delegation of Procurement (DPA) Training for all active GWACs Governmentwide Acquisition Contracts (GWACs) enable federal agencies to buy cost-effective, innovative solutions for information technology (IT) requirements from a Best-In-Class (BIC) designated contract vehicle. Because most, if not all, government agencies have a need to buy IT services and solutions, GSA has made this purchasing convenient through its GWAC Programs. In t...
Securing IT/OT Convergence: Lessons fro...
The convergence of IT and OT within the Department of Defense (DOD) and the federal government presents unique cybersecurity challenges, particularly in protecting critical infrastructure and industrial control systems. As highlighted in the latest CrowdStrike Global Threat Report, adversaries are increasingly targeting operational technology environments, exploiting vulnerabilities in industrial control systems and the Extended Internet of Th...
RVAsec 2025
RVAsec is Richmond Virginia’s security conference that brings together top speakers, vendors, and attendees in the mid-Atlantic region. The conference will be held at the Richmond Marriott Downtown on Tuesday, June 3 and Wednesday, June 4 2025. What to expect at RVAsec 14:Awesome keynotes by TBD and TBDGreat speakers with great topics! Download our mobile app and check out the schedule on Sched!Breakfast, lunch, coffee & snack breaks...
June 3-4, 2025
Organizer:
RVAsec Location:
Richmond, VA
Government Innovation Week - Federal US
Don’t miss this one of a kind, by invitation gathering of senior level IT, Technology and Innovation leaders from federal government. This conference is not just another event; it is a unique opportunity specifically designed to engage high-level discussions between decision-makers and transformation leaders in a peer to peer, collaborative and closed-door setting. During innovation day, join some of the government’s most inn...
ICS/SCADA Cybersecurity Symposium
Organizations in manufacturing, transportation, energy, water treatment, healthcare and other critical sectors face the increasingly present threat of cyber attacks to their industrial control systems (ICS). Advanced persistent threat (APT) groups have the resources and support to mount attacks that are complex, orchestrated, and ever-more sophisticated. Operators of critical infrastructure face the critical task of continually safeguarding ke...
June 3-4, 2025
Organizer:
Infosec Location:
Chicago, IL
Government Innovation Showcase Federal US
Don’t miss this one of a kind, by invitation gathering of senior level IT, Technology and Innovation leaders from federal government. This conference is not just another event; it is a unique opportunity specifically designed to engage high-level discussions between decision-makers and transformation leaders in a peer to peer, collaborative and closed-door setting. This is poised to be the most valuable innovation and technol...
Google Workspace Los Angeles County Roadshow
Attendees will leave with an understanding of how Google Workspace can help their Departments: Work better together: Experience seamless collaboration and boosted productivity. Simplify work: Streamline tasks and increase efficiency with intuitive tools. Upgrade security: Protect sensitive data with Google's advanced security features. Save money: Reduce IT costs and licensing fees.
Supercharge KYC and Onboarding initiati...
In this workshop, we will discuss how AI can be infused into the KYC process and where Generative AI fits into an organization's onboarding strategy. Join us to understand watsonx.ai and IBM OpenPages can supercharge your KYC process. If you have any questions regarding the event, please send an e-mail to
[email protected]
June 4, 2025
Organizer:
IBM Location:
New York, NY
GenAI & Productivity: Where to Focus fo...
GenAI and other digital technologies hold significant potential to transform work and drive productivity gains. However, achieving these outcomes requires more than adopting tools or following trends. In a market flooded with inflated promises and hype, many organizations risk costly missteps by investing in areas unlikely to yield results. To truly realize the productivity promise of AI, executive leaders need a grounded, pragmatic approach t...
June 4, 2025
Organizer:
Gartner Location:
Webcast
Next Generation HSM: Modernize Security...
How much is your legacy Hardware Security Module (HSM) infrastructure holding you back? Legacy HSMs were not designed for the evolving demands of today’s federal IT environments. Burdened by manual operations, limited scalability, and outdated architectures, these systems are costly to maintain, unable to meet the requirements of Zero Trust, and difficult to integrate with modern federal IT strategies. Additionally, many legacy HSMs are...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.