331 webcasts found
+ 8700 past events found
Back to Search Begin New Search Save Search Auto-Notify
Solving STIGs and Automating Compliance...
System Technical Implementation Guidelines (STIGs) are system configuration guidelines provided by the Defense Information Systems Agency (DISA) that are commonly used in the federal and DoD space to meet system compliance requirements when it comes to system configuration. This effort can be extraordinarily complex and time-consuming for the people that are responsible for executing this work. Not only must each system component be configured...
Add Favorite
Surveillance Off-Grid: Deploying Hybrid...
New surveillance technology and smart analytics allow technology to supplement and sometimes even replace physical security guards. Deploying this technology has the potential to make a facility much more secure, but security experts have a tendency to neglect the most vulnerable areas because of local power or connectivity issues. In a world where the power grid is increasingly unreliable, we'll explore new technology solutions that allow for...
Add Favorite
Data Governance, Data Quality, and Data...
Data lakes are a key component of many organizations' digital transformation initiatives and are the core of their data management strategies. Self-service consumption is essential for a successful data lake but is often the hardest activity to enable and support.Collibra and AWS discuss how customers with their data lake on AWS use the Collibra Data Catalog to give all users the ability to discover the data they need, understand if it's the r...
Add Favorite
Supporting COVID-19 Financial Managemen...
The CARES Act is a $2.2 trillion economic stimulus bill enacted to provide fast and direct economic assistance for American workers, families, small businesses, and industries. The Department of Health and Human Services played a significant role in the deployment and management of the CARES Act and other supporting legislation through programs such as the Provider Relief Fund and Accelerated and Advanced Payments Medicare programs. HHS operat...
Add Favorite
The Sierra Nevada Conservancy's Data Cl...
Sierra Nevada Conservancy is a state agency that leads California's efforts to restore and enhance the natural resources and communities of Sierra Nevada while protecting them from wildfire and a changing climate. The Conservancy's efforts improve the environmental, economic, and social well-being of the Sierra Nevada region and California citizens. Yet, the agency is only 48 people supported by a single analyst. These conditions and others ha...
Add Favorite
Easily Design and Optimize Web Experiences
Today, agencies must take advantage of digital channels to create professional, well-designed communications that inform constituents and help them access services online. Many organizations are turning to Adobe XD and Adobe Experience Manager (AEM) Sites to help create landing pages, microsites, and websites that support their initiatives and relay vital information to the public. Join our complimentary webinar to learn how to empower governm...
Add Favorite
Top Questions on the American Rescue Pl...
By now, most state, local, and tribal governments have received their funding from the American Rescue Plan Act (ARPA). The big question for many who are managing these types of stimulus funds for the first time is: Now what? Where do I start? What's the best way to report on this funding? How do I manage any recipients of this funding? How do I track progress? Join this complementary webinar to ask our certified grant management specialists a...
Add Favorite
Streamline DOJ SOC Operations Using Spl...
Security teams across the Department of Justice face an ever-increasing number of security incidents that often require manual investigation efforts to identify, analyze, and mitigate these threats facing their organizations daily. Join us for a presentation on how customers have reduced response and resolution time through security orchestration and automation via Splunk SOAR. During the presentation, we will discover how Splunk SOAR can prov...
Add Favorite
Analyzing Data: An Enterprise Resource...
The Congressional Research Service noted a decade ago that, “Intelligence is valuable only if it can be shared with consumers who need it, but, to the extent that it is more widely shared, risks of compromise are enhanced.” That report was prompted in part by 9/11. In the twenty years since, “need to know” has become “need to share” throughout the federal government as agencies have come to realize the value...
Add Favorite
Prevent & Detect Business Email Comprom...
BEC attacks on city, state, local governments and educational institutions is a major cyber threat hitting organizations today. Across the nation, these attacks present a significant and unique challenge for resource-strapped local governments and educational entities. The FBI reports that 51% of all Cyber losses originate with BEC. Security leaders need strategies that help mitigate these common attacks and get ahead of threat actors today -...
Add Favorite
Back to Search Begin New Search