Back to Search Begin New Search Save Search Auto-Notify
Achieving Decision Dominance in a Multi...
Everfox, Dell Technologies and Carahsoft invite you to join us at the Ritz-Carlton in Washington, DC, on July 15th from 1pm to 4pm ET as we explore the challenges of ‘Achieving Decision Dominance’. Decision Dominance within Government can be achieved through fostering a culture of innovation and continuous improvement. By working with industry partners, the US government can leverage expertise and advancements to secure its strateg...
July 15, 2025
Organizer: Everfox Government Team at Carahsoft
Location: Washington, DC
Add Favorite
The Definitive Red Hat Enterprise Linux...
Join Red Hat for an in-person workshop in Reston, VA to get hands-on with Red Hat Enterprise Linux 10 (RHEL 10), the most advanced release yet. Flipp Bunts, our featured trainer, has over 20 years of experience in designing highly-available Linux clusters and is know for his work in architecting classified networks, implementing continuous monitoring and migrating legacy Unix systems to Linux. During this training, Flipp will take the stage to...
July 15, 2025
Organizer: Red Hat Government Team at Carahsoft
Location: Reston, VA
Add Favorite
Getting to Continuous Authorization to...
One of the most beneficial practices any agency can implement is achieving and maintaining Continuous Authorization to Operate (cATO). It allows an organization to maintain ongoing authorization for their systems and software, rather than having to obtain a one-time ATO for each deployment. Gaining a cATO requires agencies to implement continuous monitoring of the security of their systems and practicing active cyber defense measures that proa...
July 15, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Non-Human Identity (NHI) Summit 2025
The rise of non-human identities (NHIs) is reshaping the cloud security landscape. APIs, service accounts, bots, and machine identities now outnumber humans in most cloud environments—and they often hold the keys to your most critical systems. Join global cloud and identity experts for CSA’s first-ever Non-Human Identity Summit, a free, two-day virtual event dedicated to tackling the complex challenges of NHI management. NHI Summit...
July 15-16, 2025
Organizer: Cloud Security Alliance
Location: Virtual
Add Favorite
HEC-RAS
This course provides an introduction of HEC-RAS with applications to dam safety. The course provides a hands-on opportunity to use the program and resolve specific questions. The objective of this course is to review the basic principles of open channel hydraulics as they relate to the natural stream environment with application to dam safety. Bridges, culverts, and in-line structures will be discussed and both steady and unsteady flow modelin...
July 15-18, 2025
Organizer: Association of State Dam Safety Officials
Location: Virtual
Add Favorite
Understanding and Navigating the Servic...
OverviewFailure to understand and comply with the McNamara-O’Hara Service Contract Act (SCA), or Service Contract Labor Standards (SCLS) can lead to costly outcomes, withholding of contract funds, and even debarment. Cross-functional (i.e., Human Resources, Contracts, Payroll, Accounting) understanding of the SCA is imperative to successfully administer an SCA contract. Many contractors find SCA confusing and intimidating, which often le...
July 16, 2025
Organizer: Redstone Government Consulting
Location: Huntsville, AL
Add Favorite
The Two-Edged Sword of AI in Cybersecurity
Artificial Intelligence (AI) is transforming cybersecurity for the better—empowering teams to detect threats faster, reduce false positives, and identify risky behavior before it becomes a breach. But there are risks associated with AI: first, that AI tools currently are new to organizations and under-regulated for their own cybersecurity, so require careful review; also, as defenders become more sophisticated with those AI tools, so do...
July 16, 2025
Organizer: Fedinsider
Location: Webcast
Add Favorite
Securing the Blind Spots of On-Prem Ser...
In this webinar, attendees will learn how to:Understand the hidden risks of Non-Human Identities (NHIs): Explore the security challenges NHIs pose in hybrid environments and why traditional identity tools fall short.Gain visibility and control: Learn how to discover, classify and monitor NHIs across on-prem and cloud systems using Silverfort’s Identity Security Platform.Strengthen your identity security posture: See how real-time risk as...
July 17, 2025
Organizer: Silverfort Government Team at Carahsoft
Location: Webcast
Add Favorite
Defending the DON: Validating Cyber Rea...
In this session, attendees will: Gain quantifiable insights into your security posture by seeing how Mandiant Security Validation (MSV) continuously tests your network, endpoint, cloud, and email security controls against real-world threat actor tactics. Optimize existing security investments and configurations while justifying security spend with empirical performance data and clear reporting on identified gaps and cyber readiness. Learn to a...
July 17, 2025
Organizer: Google Government Team at Carahsoft
Location: Webcast
Add Favorite
Zero Trust Training | CCZT
In the dynamic realm of digital security, the necessity for advanced cybersecurity measures is paramount. Progressive companies committed to protecting their digital infrastructure should focus on supporting their employees’ professional growth by enrolling them in the Certificate of Competence in Zero Trust (CCZT) training. This specialized course provides an in-depth exploration of the Zero Trust framework, arming participants with cut...
July 17-18, 2025
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
Back to Search Begin New Search