Back to Search Begin New Search Save Search Auto-Notify
What’s Brewing in Cloud Security
We’ve got your next coffee, so take a break! How much effort went into dealing with the Log4j vulnerability in your organization? Unfortunately, open source vulnerabilities like Log4j will continue to crop up unexpectedly. At Palo Alto Networks, we want you to be better prepared so that you can effectively and efficiently deal with the next occurrence. Our team of solution architects is here to help. Come learn how the largest scale env...
October 6, 2022
Organizer: Palo Alto Networks
Location: Virtual
Add Favorite
AI at Shell
Enterprise Data & AI is excited to announce the October 2022 featured presentation ‘AI at Shell’ by featured guest speakers Prakalp Somawanshi, Principal AI Engineer and Naveen Kapoor, Senior Machine Learning Engineer at Shell on Thursday, October 6, 2022 from 11:30 AM - 1 PM ET! Shell is an international energy company that aims to meet the world’s growing need for more and cleaner energy solutions in ways that are econo...
October 6, 2022
Organizer: Cognilytica
Location: Webcast
Add Favorite
Steps for Acquiring and Implementing AI...
We are quickly approaching the two year anniversary of the National AI Initiative Act becoming a law, which created a task force committee to assist the state of AI in the Federal government. The use of AI in the government helps accelerate a lot of processes but it requires extensive work, research, and resources in its implementation. In addition, it requires a uniformed language and understanding of what AI can do for your organization. Iss...
October 6, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Meeting OMB M-21-31 Requirements with Q...
As organizations work to interpret the new requirements and assess their enterprise security monitoring and reporting capabilities, enterprises must be able to rely on relevant, accurate, credible, and timely data about the maturity of their security telemetry and log management infrastructure. Organizations still employing traditional compliance models that rely on manual control validation and periodic reporting will find themselves increasi...
October 6, 2022
Organizer: Qmulos Government Team at Carahsoft
Location: Webcast
Add Favorite
DAM You Got This: Managing Complex Cont...
Digital assets (graphics, videos, presentations, etc.) are critical to communicating ideas and telling impactful stories. Digital asset management (DAM) software helps organizations find what they need, coordinate content workflows and publish up-to-date assets. Acquia's cloud-based DAM platform helps public sector agencies meet citizen service standards by creating and distributing communication in a centralized place. Join Acquia & Carah...
October 6, 2022
Organizer: Acquia Government Team at Carahsoft
Location: Webcast
Add Favorite
Native Cryptographic Networking
The internet has evolved from a best-effort IP network for file sharing, email and browsing to a network at the center of a digital revolution in the way we live, work and play. Every sector — from industry and commerce to the federal government — now relies on IP networks for connectivity and everyone expects real-time responsiveness, secure connectivity and 100% reliability. Protecting data and interactions are more important tha...
October 6, 2022
Organizer: AFCEA | Signal Webinar
Location: Webcast
Add Favorite
Zoom Trainings - October
Are you curious about what your Zoom for Government account can do for your agency? Don't miss out on Carahsoft's weekly training and discover the additional capabilities this account has to offer to successfully utilize your Zoom for Government account. Dive in and learn about: Customizing your account & profile settings Scheduling & starting instant meetings Exciting features including virtual backgrounds, filters, Zoom Whiteboard, e...
October 6, 2022
Organizer: Zoom Government Team at Carahsoft
Location: Webcast
Add Favorite
Headlines in Cybersecurity - What State...
The federal government is well ahead of state and local governments in the implementation of a zero trust architecture because of the White House Executive Order on Cybersecurity last year. But state and local agencies see it in their immediate future - 67 percent of state CIOs who responded to the 2021 Annual State CIO Survey anticipate that introducing or expanding a zero-trust framework will receive more attention in the next two to three y...
October 6, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Interactive Workshop: How To Identify Y...
Change can be incredibly slow in government. For example, sensitive documents are still printed and stored in file cabinets. Employees still obtain physical signatures for approvals and then hand-deliver them to colleagues down the hall. These are just two of the outdated business workflows government leaders are using to meet their agency’s missions. If the above resonates, do you often wonder how you can fix your slow and inefficient p...
October 6, 2022
Organizer: GovLoop
Location: Webcast
Add Favorite
Securing The Furture: Preparing for Cyb...
October is Cybersecurity Awareness Month. Join us for a virtual conversation live with Theresa Payton — the first female White House CIO and one of the nation’s foremost authorities on cybersecurity. In a keynote address, Theresa will discuss the world’s greatest cybersecurity threats and steps your organization can take to protect itself. Following her address, she will be joined by Ron Plesco, Partner in DLA Piper’s C...
October 6, 2022
Organizer: BizJournals
Location: Webcast
Add Favorite
Back to Search Begin New Search