Back to Search Begin New Search Save Search Auto-Notify
AI and State-Sponsored Espionage - A We...
Attendees joined Google Cloud, Mandiant, and GuidePoint Security for panel discussions focused on the dangers of state-sponsored cyber espionage and how Artificial Intelligence (AI) is rapidly changing the world and, with it, the landscape of cyber threats.AI is being utilized by both attackers and defenders, with the adversarial use of AI posing a growing concern.Recent trends indicate that cyber espionage is on the rise, and the employment o...
Add Favorite
Procurement Integrity - Analytics to Re...
Thank you for your interest in our SAS webinar, SAS' solutions introduce an approach to layer an analytic system on top of your existing systems, creating a continuous monitoring solution. In their upcoming webinar, subject matter experts will highlight real world examples, showing how other government entities improved their procurement and accounts payable processes by integrating with SAP, Oracle and other ERP systems. Watch the on-demand r...
Add Favorite
How to Hunt for Volt Typhoon Malware in...
The federal government has strenuously and repeatedly stated that critical infrastructure providers must be proactive in hunting for malware that may be present in networks, focusing specifically on CCP-sponsored Volt Typhoon Adversary. Attendees joined critical infrastructure experts for a panel discussion on how to hunt for Volt Typhoon. Discussion topics included:How Four18 Intelligence uses UnknownCyber ThreatHunter to hunt for Volt Typhoo...
Add Favorite
Combatting Emerging Threats: Proofpoint...
Proofpoint, BluVector and Carahsoft are excited to invite you to join us in the lead up to TechNet 2024 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. The digital evolution is moving quick, and it’s easy to be overwhelmed and click (or scan) something you shouldn’t have. Join us for an exclusive webinar where experts from Proofpoint and BluVector wi...
Add Favorite
Tableau Enablement Series Part 6 - Clea...
In an era where data-driven decision-making is paramount, the integrity and trustworthiness of your data are more crucial than ever. This webinar was designed to empower attendees with robust data preparation techniques, ensuring that their datasets are not only clean and well-structured but are also reliable and AI-ready. During this webinar, attendees learned how to:Transform raw data into trustworthy assets using Tableau Prep, ensuring thei...
Add Favorite
Shielding Helpdesk Operations Against S...
The Scattered Spider attack on MGM represented a significant breach in cybersecurity measures, disrupting the company’s services and jeopardizing customer data, all from a call into the helpdesk. The breach illustrated an identity gap in identity and access management, highlighting the significance of Caller ID Verification in fortifying helpdesk security protocols. This attack has shown the impact of an inability to ensure the identity...
Add Favorite
Cloud SynApps Workforce Management Webinar
Attendees discovered how Cloud SynApps revolutionized Workforce Development with cutting-edge technology and expert insights. The event showcased how CloudSynApps leverages Public Sector Solutions powered by Salesforce to transform Workforce Development. Solution offerings:Efficient Assessment & PlanningCustomized Care PlansStreamlined Skill DevelopmentRobust Support ServicesDynamic DashboardsListeners explored Cloud SynApps' Workforce Dev...
Add Favorite
AI Under the Sun: An ASU+GSV EDU Webina...
As summer approaches, beat the heat with cutting-edge knowledge of the transformative potential of AI within education in our summer school webinar series. Join Google Cloud experts as they unravel the capabilities of AI and offer fresh waves of insight and innovation.
Add Favorite
Federal TX Practitioners Workshop
Attendees joined ServiceNow for a dedicated technical practitioners workshop focused on how to use ServiceNow’s Software & Hardware Asset Management (SAM & HAM) to enable agencies to optimize costs and utilization of their asset investments to reduce spend, mitigate asset risk, and automate the full asset lifecycle with workflow — on a single platform. Attendees heard directly from our asset management experts and were able...
Add Favorite
Choosing the Right Mobile App Security...
In today's rapidly evolving digital landscape, securing mobile applications is more critical than ever for enterprises. As cyber threats become increasingly sophisticated, organizations must carefully consider their approach to mobile app security. Should they adopt a comprehensive platform solution or opt for best-of-breed tools tailored to specific needs?Join us for an insightful webinar with GigaOm’s Howard Holton. We will explore th...
Add Favorite
Back to Search Begin New Search