Back to Search Begin New Search Save Search Auto-Notify
Rethink Your Contact Center with CloudHesive
On Thursday, June 6, CloudHesive, Amazon Web Services (AWS) and Carahsoft hosted an engaging webinar on the dynamic world of contact centers. Navigating attendees through the latest transformations in contact center operations and learning strategies to thrive in this ever-evolving industry. Attendees of the webinar left with a deeper understanding of:The contact center spaceThe ConnectPath CX solution and its benefitsCurrent trends in contact...
Add Favorite
Implementing Zero Trust Controls and Mo...
Cybersecurity compliance frameworks are curated with the most effective methodologies an organization can take to prevent cyberattacks and reduce the impact if one occurs. If passed in current form, NIST 800-171A Rev.3 final public draft will adopt substantial changes to existing compliance controls required by the Cybersecurity Maturity Model Certification (CMMC). All those within the Defense Industrial Base will be required to observe substa...
Add Favorite
Embracing A Data-Driven Approach To Cyb...
Understanding what devices exist in your environment is the foundation to security. Identify compliance gaps and risks for all IP connected assets regardless of if they are managed or unmanaged. Where are you today with your Asset Management mission? Allow Armis to provide you real-time visibility and control over every asset connected to your network. The overview of the platform focused on:Discovering and managing an accurate, unified and co...
Add Favorite
Gemini for Google Workspace: Developing...
Gemini for Google Workspace is a powerful collaborative partner that can act as an effective prompt, thought partner, source of accuracy and productivity booster—all while ensuring every user and organization has control over their data. In this session, attendees learned about:Leveraging generative AI for enhanced efficiencyPrioritizing public sector use cases for maximum impactPractical examples and best practices tailored to governmen...
Add Favorite
From Silos to Synergy: Bringing Higher...
In the rapidly growing world of AI, organizations have a responsibility to modernize and secure their Data Solutions and trust their information is 100% reliable, auditable, and accessible. Eon Collective guides organizations to establish their sustainable solution to prepare for AI integration by leveraging standardized open-source methodologies to obtain a robust system of Business Intelligence. These methodologies align people, process, and...
Add Favorite
Protecting Sensitive SAP Data with Dyna...
Attendees joined Pathlock experts Jordan Tunks and Rajesh Rengarethinam to discuss:Implementing dynamic data masking controls to protect sensitive SAP data against exploit by internal and external threatsBest practices for using Attribute-Based Access Controls (ABAC) and Dynamic Data Masking to safeguard sensitive SAP data Real-world use cases highlighting how Dynamic Data Masking and ABAC secure sensitive SAP data and govern user accessHow th...
Add Favorite
Lunch Bytes Webinar Series
Instead of settling for a regular break, participants joined Dynatrace online for Lunch Bytes, a snackable series of easily digestible events covering today's leading technology topics. Participants upgraded their lunch time with Public Sector Solutions Engineer, Matt Gardner, as he shared tactical insights and practical use cases on the following topics across four 30-minute sessions.
Add Favorite
Data Governance Demystified: From Chaos...
Embark on a journey to unravel the complexities of data governance with Tableau in our webinar. We uncover the pivotal role Tableau plays in establishing robust data governance frameworks that ensure data integrity, compliance and trustworthiness. During this webinar, attendees learned:Defining data policies to implement governance controlsPractical strategies and techniques to effectively govern a data landscapeTableau's powerful features and...
Add Favorite
Generative AI: Uses and Abuses in Cyber...
As organizations around the globe grapple with the implications of Generative AI (GAI) in cybersecurity, we recognize the importance of understanding its true impact and potential vulnerabilities. With the rise of GAI in both legitimate and malicious contexts, it is crucial to discern between hype and reality. This webinar, hosted by Trend Micro and Carahsoft, explored the nuances of GAI, particularly focusing on its utilization by threat acto...
Add Favorite
Maximize Security Detection with CrowdS...
CrowdStrike | Mimecast State, Local and Education webinar was on June 11th. During this webinar, Omar Cordova, Senior Sales Engineer at Mimecast, and Josh Radlein, Solutions Architect at CrowdStrike discussed how you can help secure your customer’s environments from sophisticated, targeted threats.In the current cybersecurity climate, organizations need to protect themselves from the increasing volume and impact of ransomware, impersonat...
Add Favorite
Back to Search Begin New Search