Back to Search Begin New Search Save Search Auto-Notify
Successfully Navigate the Convergence o...
In this webinar, attendees will learn: How to overcome internal control siloes and the increasing Importance of Cross-Application GRC Overcoming challenges posed by elevated or privileged access requirements Why Continuous Controls Monitoring should be at the heart of your GRC strategy Best practices for evaluation solutions
Add Favorite
MAXimize Your Creative and Document Workflows
At this year's Adobe MAX Creativity Conference, guests got the inside scoop into the future of Adobe Creative Cloud. Attendees witnessed captivating demonstrations on new updates to your favorite applications, as well as brand new rollouts such as Adobe Firefly Artificial Intelligence (AI). Adobe has launched innovations across Creative Cloud applications, with Document Cloud integrations that will accelerate content creation at the speed of g...
Add Favorite
MOSAICS and the Future of Industrial Cy...
As the vulnerability of industrial control systems (ICS) to cyberattacks continues to have a clear impact on infrastructure security, emerging security solutions are essential to the future of industrial cybersecurity. MOSAICS – More Operational Situational Awareness for Industrial Control Systems – is the working prototype demonstrating an integrated capability for ICS operational defense. This roundtable discussion pulls together...
Add Favorite
BeyondTrust Tech Talk: Gain a 360-Degre...
With the increase in sophisticated cyberattacks, it is imperative to revamp cybersecurity processes and re-focus security beyond the perimeter. In their Special Publication, 800-207 Zero Trust Architecture, NIST points to identity as the critical first step to regaining control over the perimeter. Join this interactive session and demo to understand how BeyondTrust Privileged Account and Session Management (PASM) can help you control access an...
Add Favorite
Pain-free, Controlled Technology Migrat...
Migrating cloud services, databases, and APIs can mean using an all-or-nothing approach that is risky, costly and time-consuming, putting your agency at risk of infrastructure routing complexities and user experience challenges that can slow down or even halt agency modernization efforts. Join LaunchDarkly online on November 14 to discover better, safer ways to migrate your agency’s tech stack and turbocharge your agency’s moderniz...
Add Favorite
Leveraging Technology for Regulatory Ex...
Join Gov2Biz, AWS and Carahsoft for an engaging webinar on the transformative role of technology in alcohol regulation. General Bentley Nettles, former Executive Director of the Texas Alcoholic Beverage Commission, shares the success story of Alcohol Industry Management System (AIMS). AIMS replaced 18 legacy systems, resulting in a remarkable increase in license issuance speed. Discover how state government agencies can effectively leverage t...
Add Favorite
How Tanzu Can Help Developers Go Fast Forever
VMware Tanzu Lab de-risks mission-critical software development by helping you write applications and features that delight users and accelerate mission outcomes. We can help you write great applications using proven practices and cloud native principles. Best of all, our collaborative approach allows for the transfer of modern development skills to your team, enabling you to continue building awesome software after our engagement ends. In oth...
Add Favorite
VMware Arizona Day
In this on-demand webinar, VMware subject-matter experts discussed VMware solutions and how they can benefit you and your organization. View the topics covered below: Agenda:8:00am - 9:00am: Registration/Breakfast9:00am - 9:15am: Opening Session - Jim Falvey, Sr. Sales Director - Public Sector, VMware9:15am - 10:00am: Security Mindset - Christopher McCain, Sr. Technology Director - Networking and Security, VMware10:00am - 10:45am: Ransomware...
Add Favorite
Establishing Boundaries in Today's Data...
Attendees of this on-demand webinar explored the intricacies of establishing and managing boundaries within data centers and IT infrastructure, which is crucial in the era of Zero Trust.
Add Favorite
F5 Red Hat Tech on Tap
APIs are the lifeblood of the internet today. Everything from booking flights to reading your daily newsfeeds is all made possible by the growth of data sharing using Application Programming Interfaces (APIs). With the growth of modern applications, developers often unintentionally leak sensitive datasets. The proliferation of APIs has marked them as a prime target for malicious actors and nation-states leaving the DoD and the War Fighter vuln...
Add Favorite
Back to Search Begin New Search