̽»¨ÊÓÆµ

̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Onsite Event

̽»¨ÊÓÆµ's 16th Annual Rob Efrus Budget Breakfast & ̽»¨ÊÓÆµ Business Update


Event Date: December 12, 2025
Hosted By: ̽»¨ÊÓÆµ
Location: Reston, VA

Join us for Ì½»¨ÊÓÆµ’s 16th Annual Rob Efrus Budget Breakfast, where Rob Efrus, CEO of Efrus Federal Advisors, will break down Congress’s efforts to complete the Fiscal Year 2026 (FY26) appropriations process and what it means for the Federal technology market.

Vendor partners will receive high-value intelligence on the budgetary, policy and acquisition dynamics shaping Federal IT and cyber plus practical guidance to accelerate opportunities as agencies restart operations and move quickly into FY26.

Key topics will include:

  • CRomnibus & FY26 Outlook: What’s funded now, what’s next and timing for remaining appropriations
  • NDAA (FY26): Conference status and priority implications for DoW and key Civilian agencies
  • Procurement Policy & FAR: Updates influencing Federal buying behavior
  • OneGov: Implementation status and how it impacts procurement pathways
  • DoD Acquisition Reforms: Accelerated pathways, OTAs and portfolio-based buying
  • FMS Signals: Where international demand aligns with U.S. modernization
  • Artificial Intelligence & Cybersecurity: Funding priorities, mandates and mission-driven use cases

For questions on the budget, CRomnibus or positioning your FY26 pipeline, reach out to Rob Efrus (rge@efrusfederal.com). As always, your ̽»¨ÊÓÆµ team is available to support execution and help you move fast in this window.

Register now to secure your spot.


Resources


NIST Zero Trust Architecture and Certes Networks Zero Trust Platform
Whitepaper

NIST Zero Trust Architecture and Certes Networks Zero Trust Platform

Certes Networks aligns with NIST's SP 800-207, aiding organizations in meeting Zero Trust Architecture requirements through Policy Definition, Micro-segmentation, and Observability. Their Layer-4 encryption solution secures data in transit across any network, ensuring data protection independent of underlying infrastructure, catering to diverse entities from government agencies to regulated industries.


Fill out the form below to view this Resource.