Certificate of Cloud Security Knowledge...
Certificate of Cloud Security Knowledge v5 | Lectures and Labs Get Certified in Cloud Security with CCSK v5 Plus Certification Training Advance your career and strengthen your cloud security expertise with CCSK Certification Training—a globally recognized certification from the Cloud Security Alliance (CSA). Our comprehensive CCSK v5 Plus Training course fully prepares you for the Certificate of Cloud Security Knowledge (CCSK) exam with...
State of Code Webinar Series
Recent projections reveal the staggering cost of poor software quality: over $2.41 trillion annually in the US, with nearly two-thirds attributed to the cybercrime fueled by insecure code. Register for Sonar's State of Code webinar series to learn how their integrated solution for code quality and code security analysis is designed to help software developers reduce this cost and streamline workflows with AI. Join Sonar solution experts online...
Intelligent Data Infrastructure: Poweri...
Federal Civilian agencies face mounting pressure to modernize IT infrastructure, adopt AI responsibility, strengthen cyber resilience, and embrace the cloud - all while improving efficiency, reducing costs, and protecting mission integrity. You're invited to join NetApp and Carahsoft for a webinar series designed to equip agencies with practical strategies, proven solutions, and expert insights for accelerating transformation across critical m...
The Missing Link in Threat Detection: C...
When it comes to securing industrial environments, host and network data are two halves of the same story. Network data shows you what’s moving, where it’s going, and how it flows, but without host data, you can miss the “why” and “how” behind suspicious activity. Host data gives the inside view: process activity, system changes, and user actions that can reveal the root cause of an incident. Without both pu...
Escape Rising Virtualization Costs with...
Rising licensing costs and restrictive bundling models have left many government customers paying more than ever for virtualization solutions—often for features they don’t even use. These unexpected expenses create budget challenges and limit flexibility at a time when agencies are under pressure to modernize efficiently. With HPE VM Essentials (VME), there’s a smarter way forward. This solution delivers the agility and perfo...
VETS 2 DPA Training
CANCELED
Who Should Attend:All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how the VETS 2 GWAC can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against the VETS 2 GWA...
DNS Under Siege: Unmasking the Infrastr...
In today’s threat landscape, DNS is no longer just the phonebook of the internet. It’s a battleground. Threat actors are exploiting DNS with unprecedented speed and sophistication, leveraging ephemeral domains, traffic distribution systems (TDS), domain hijacking and adversarial AI to evade detection and scale attacks. In this webinar, you'll learn about:The rise of one-time-use domains and their role in control evasionHow maliciou...
Vulnerability Management 101
During this webinar attendees will learn: The importance of basic cybersecurity hygiene. The intersection of vulnerability management and MITRE ATT&CK How vulnerability management plays a role with various standards and frameworks
From AI Readiness to AI Enablement
Federal agencies are accelerating their adoption of artificial intelligence (AI) to meet growing demands to increase speed and efficiency to keep pace with AI requirements. Yet, AI is only as effective as the trusted data that powers it. While agencies possess vast data amounts of datasets and data products, much of it remains isolated, inconsistent, and untrusted, putting AI program at risk. To unlock the full potential of AI, data must be ac...
October 21, 2025
Organizer:
FedInsider Location:
Webcast
Smarter Contracts, Stronger Missions
Icertis and Carahsoft are excited to invite you to join us subsequent to AUSA 2025 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. In today's rapidly evolving defense and government contracting landscape, agility, compliance, and visibility are mission-critical. AI-powered contract lifecycle management (CLM) is transforming procurement and performance across the...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.