The Role of AI in Modern Government
The federal government is moving quickly to embrace the use of AI tools across agencies. The purpose of such tools is to improve delivery of public services, enhance decision-making, and strengthen national security. To use these tools responsibly, agencies must understand their infrastructure, data governance, and workforce availability policies, and how they intersect with AI requirements and operations. Additionally, there are ongoing conve...
November 14, 2025
Organizer:
FedInsider Location:
Webcast
Creating a Data Driven Government with...
In this era of data driven decision-making, North Carolina agencies are poised to harness their data's transformative power for deeper analytical insights and mission-critical AI. Join Databricks for a free seminar focused on exploring the Databricks Data Intelligence Platform—a state-of-the-art solution built to improve and secure data accessibility and sharing, simplify data management, adopt AI/BI capabilities and promote more effecti...
IAEM Annual Conference & EMEX 2025
EMEX brings together the latest technological advances in homeland security and disaster preparedness suppliers under one roof, under the auspices of the International Association of Emergency Managers Annual Conference. Education and Training: Best value for obtaining/learning new skill sets. Learn best practices from the field’s most respected speakers. Hear lessons learned from actual disasters. Earn certificates of attendance for tra...
November 14-20, 2025
Organizer:
IAEM Location:
Louisville, KY
Certificate of Cloud Security Knowledge...
Get Certified in Cloud Security with CCSK v5 Plus Certification TrainingAdvance your career and strengthen your cloud security expertise with CCSK Certification Training—a globally recognized certification from the Cloud Security Alliance (CSA). Our comprehensive CCSK v5 Plus Training course fully prepares you for the Certificate of Cloud Security Knowledge (CCSK) exam with in-depth knowledge and hands-on experience to secure complex clo...
Customization and Utilization of Dam Op...
Join us on Tuesday, November 18 from 12:00 PM - 2:00 PM Eastern for Customization and Utilization of Dam Operation and Maintenance Manuals. This webinar will provide participants with information on the preparation and utilization of operation and maintenance (O&M) manuals for dams of varying type and size. It will serve as an update to and expansion upon ASDSO’s 2014 webinar, “Developing Operations and Maintenance Manuals for...
State of Code Webinar Series
Recent projections reveal the staggering cost of poor software quality: over $2.41 trillion annually in the US, with nearly two-thirds attributed to the cybercrime fueled by insecure code. Register for Sonar's State of Code webinar series to learn how their integrated solution for code quality and code security analysis is designed to help software developers reduce this cost and streamline workflows with AI. Join Sonar solution experts online...
The Insider Risk Playbook for Federal C...
Federal agencies are expected to detect insider threats early—before they compromise operations, national security or trust in government. This webinar will outline how public sector, cybersecurity and counterintelligence teams are shifting from reactive alert triage to proactive human risk management, using behavioral context and mission-aligned analytics. This session is designed for CISOs, insider threat leads and cyber operations tea...
State of Defense Business Acquisition Summit
The Pentagon’s acquisition process has long posed challenges for both government and industry, with bureaucratic hurdles often slowing innovation. As the Department of Defense advances urgent modernization efforts, streamlining how the military buys and fields technology is more important than ever. From autonomous drones and AI-driven tools to munitions stockpiles and shipbuilding capacity, today’s security landscape demands faste...
November 18, 2025
Organizer:
Defense One Location:
Washington, DC
VETS 2 DPA Training
Who Should Attend:All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how the VETS 2 GWAC can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against the VETS 2 GWA...
Information Security Forum
The Chicago Forum is designed for information security practitioners across all industries to dive deep on specific topics, share insights, and network with peers. This one-day event incorporates breakouts with IANS Faculty, spotlight sessions on emerging technologies, and opportunities to network with your peers. Topics fall into three tracks:Security Architecture and Security OperationsGovernance, Risk Management, and ComplianceLeadership an...
November 18, 2025
Organizer:
IANS Location:
Chicago, IL
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.