How to Get the Most Out of Your AI Inve...
In today’s fast-paced AI landscape, it can be tempting to explore every AI use case applicable to your agency. However, staying ahead doesn’t mean adopting every new AI tool as it emerges. The most crucial step before diving into new technology is to create a comprehensive AI strategy that prioritizes long-term impact—this is key to maximizing your AI program’s ROI. Join Government Technology and HP for a live webinar w...
AI in Government Solution Showcase: Session 2
As the defense sector stands on the brink of a technological revolution, GenAI is poised to transform how government agencies operate, enhancing decision-making, streamlining workflows, and bolstering security like never before. Join Yurts and Oracle where we explore how GenAI can tackle critical challenges in data integration, decision-making, and operational efficiency. Learn from experts about real-world GenAI implementations and gain inval...
Petabyte Scale Data Migration and Remot...
Public sector agencies collect thousands of disparate data sets across their organizations, which creates a domino effect. Without the full picture, government officials are hindered from making informed decisions and from responding efficiently to threats. This is especially true in remote locations and mobile edges, such as military vehicles. TSecond’s BRYCK Platform offers a new, non-disruptive solution for capturing, processing and m...
Best of World 2024: Cloudy with a Chanc...
The forecast is looking very cloudy… but that's a good thing. Gain a deeper understating of cloud native technologies in the industry landscape and understanding how these have been applied to the MicroStrategy ONE platform. This webinar will also provide a deeper look into the underlying technology and our roadmap for the future.
Beyond Traditional Boundaries: Moderniz...
While the Personal Identity Verification (PIV) and Common Access Card (CAC) represent a high assurance, technically interoperable, and a highly regulated method of authentication, they suffer from factors such as ease of use, ability to work with mobile devices and across devices. Office of Management and Budget (OMB) memorandum M-19-17, Enabling Mission Delivery Through Improved Identity, Credential, and Access Management, opened the door for...
July 11, 2024
Organizer:
ATARC Location:
Webcast
The Power of AI in Action
Security teams have an important job: to protect the organization from an ever-evolving threat landscape. With growing amounts of data, ever-changing threats and the sheer volume of security alerts, this can feel overwhelming. But there is a better way. Cortex XSIAMŽ unites SOC capabilities that include XDR, SOAR, SIEM, ASM and others into a single SecOps platform. It empowers security analysts with AI-driven outcomes and an automation-first a...
Zero Trust in Action: Approaches to Mob...
In today’s rapidly evolving cybersecurity landscape, Zero Trust has emerged as a critical strategy to defend organizational assets against persistent cyber threats. However, the presence of mobile devices in enterprise environments poses significant challenges to traditional Zero Trust implementations. As government agencies increasingly rely on mobile devices to conduct business and communicate, ensuring the security of these endpoints...
June 27, 2024
Organizer:
ATARC Location:
Webcast
Redefine the Future of Constituent Enga...
There's a lot of buzz surrounding generative AI, but the advantage of the technology goes beyond buzzwords. AI solutions offer significant value to operations and reduce pain points for governments and the residents they serve. Join Government Technology and NICE for a live webinar on how governments can use AI and other modernization tactics to enhance service accessibility and create seamless constituent experiences. Here's what's in store:...
Responsible and Transparent Approach to...
The White House Executive Order for New Standards for AI Safety and Security and the Department of Homeland Security’s IT Strategic Plan includes the actions to ensure AI systems are safe, secure, and trustworthy, used responsibly, and address algorithmic discrimination. In this webinar, speakers will delve into the development and training of biometric matching algorithms and steps you can take to mitigate bias. The impact of bias inclu...
June 26, 2024
Organizer:
IDGA Location:
Webcast
Big Data, Big Challenges: How Governmen...
Data is the biggest asset of modern organizations. But thanks to an increase in data breaches, evolving privacy regulations, and litigation volumes, data can also be an organization’s biggest liability. Good data governance is critical to government agencies’ ability to effectively respond to requests for data and reduce their overall risk. Join us online Tuesday, June 25 from 2-2:50 p.m. ET/11-11:50 a.m. PT to hear from government...
June 25, 2024
Organizer:
GovLoop Location:
Virtual
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.