Back to Search Begin New Search Save Search Auto-Notify
Navy 2.0: Charting a Course for 21st Ce...
This insightful webinar delved into the importance of efficient onboarding processes and how they are integral to organizational success. Navy Human Capital Strategy acknowledges the significance of refining onboarding procedures, particularly for Contract Technical Representatives (CTRs), civilian staff, and uniformed members. In this webinar, we explored the integration of ServiceNow, a robust digital workflow platform, to revolutionize the...
Add Favorite
Leveraging Tableau Stories and Dashboar...
CoSN has unveiled its groundbreaking Digital Equity Dashboard with data curated by Innive K12 360° to empower school districts and communities to harness data in their pursuit of bridging digital equity gaps. This robust dashboard, created in Tableau and leveraging the power of Tableau Data Prep, seamlessly amalgamates multiple national datasets, presenting them within a singular, cohesive dashboard. This webinar explored the transformative po...
Add Favorite
Using AI to Prevent Data Loss and Email...
A comprehensive approach to stopping sensitive data loss combines a traditional rules-based approach with behavioral AI. Organizations face substantial security risks from misdirected emails and data exfiltration, leading to increased labor costs for investigations, regulatory reporting, and compliance communications. As a key conduit for sensitive data, email can expose businesses to regulatory fines, reputational damage, and customer loss. T...
Add Favorite
Fortress in the Cloud: Building Zero Trust
In today's increasingly complex cloud landscape, securing your environment requires a fundamental shift from traditional castle-and- moat defenses to a zero trust approach. This webinar, co-hosted by Palo Alto Networks and AWS, guided attendees through the essential concepts of zero trust security and explored how Palo Alto Networks and AWS can empower the attendees to achieve it.During this webinar, attendees:Understood the core principles of...
Add Favorite
Defend Smarter: Leveraging AI to Maximi...
Are you struggling to keep up with ever increasing security compliance and regulatory requirements? Is your team tired of manually intensive and labor some work for keeping up compliance efforts? Unlock the potential of automated and continuous security compliance and risk management to fortify your organization's defenses. Attendees joined us to learn more about:Regulations and industry standards driving cybersecurity efforts in the public se...
Add Favorite
Using the Right Data for Compliance and...
Navigating the federal contracting process poses significant challenges for government contractors particularly in the areas of compliance, performance management and contract close-out. The sheer volume of data available often overwhelms contract managers, leading to uncertainty about which data points are pertinent for measuring performance to ensure compliance requirements are met. Watch this on-demand webinar to learn how Icertis and Accen...
Add Favorite
AI Under the Sun: An ASU+GSV EDU Webina...
As summer approaches, beat the heat with cutting-edge knowledge of the transformative potential of AI within education in our summer school webinar series. Join Google Cloud experts as they unravel the capabilities of AI and offer fresh waves of insight and innovation.
Add Favorite
AI Under the Sun: An ASU+GSV EDU Webina...
As summer approaches, beat the heat with cutting-edge knowledge of the transformative potential of AI within education in our summer school webinar series. Join Google Cloud experts as they unravel the capabilities of AI and offer fresh waves of insight and innovation.
Add Favorite
F5 BIG-IP Next - Explore the Next Gener...
Attendees joined F5 and Iron Bow at Rocket City Tavern on Tuesday, June 18th for a hands-on lab featuring BIG-IP Next.All BIG-IP users were invited to this personalized training on BIG-IP Next, F5’s Next Generation Platform. During the session, attendees received a first look at the BIG-IP Next platform while going through application deployment exercises to address load balancing, application security, and app access use cases.During th...
Add Favorite
Leveraging AI for Audio and Video Redaction
The proliferation of audio and video evidential media continues to be on a constant rise. From body-worn camera footage to surveillance cameras to jailhouse calls to mobile phone camera footage, all these types of audio and video files that agencies have on record or are part of an investigation are subject to public release if it is part of a legal matter or part of an open public records request. The challenge with this is that the redaction...
Add Favorite
Back to Search Begin New Search