1,604 webcasts found
+ 4230 past events found
Back to Search Begin New Search Save Search Auto-Notify
From Data to Decisions in Tableau Pulse...
Tableau Pulse is a reimagined data experience that makes data more accessible to everyone regardless of their expertise with data visualization tools. Attendees of this webinar were able to learn how to leverage the power of Tableau AI to deliver data in ways that are more personalized, contextual and smart. During this webinar, attendees were able to: Learn what Tableau Pulse is and how it can fit into your daily workflow Understand how to ge...
Add Favorite
AI-Enhanced Inspections & Work Order Au...
This webinar delved into the invaluable lessons learned and the powerful capabilities unlocked through this venture and implementing it for the state government. We will discuss how AI and Salesforce are redefining efficiency in government operations, particularly in the realms of case management and resource allocation. Key Takeaways: Image Recognition: Confirming descriptions and providing additional details. Data Management: Enhancing clean...
Add Favorite
Microsoft Office Offensive Tradecraft
View this webinar to learn more about: Recent developments such as Mark-of-the-Web Microsoft security controls including trust settings and decision flows Tactics for gaining initial access, lateral movement, and long-term persistence
Add Favorite
Enforce Least Privilege Across Every Endpoint
Almost every cyberattack today involves the exploitation of privileges. Broad privileges and entitlements greatly expand the attack surface and leave your organization extremely vulnerable to security breaches. However, a least-privilege access approach requires that users and programs receive the least amount of permission when required to complete specific tasks. Least privilege is one of the most essential security measures for organization...
Add Favorite
Modernizing Security: Simplifying Zero...
Government security teams today are under constant siege. Not only are they responsible for defending their organizations, but they are also tasked with complying with new and in-depth mandates that span Zero Trust, logging and most recently, artificial intelligence (AI). Leading agencies such as Oak Ridge National Laboratory are at the forefront of security innovation modernization. They achieve this by embracing next-generation solutions tha...
Add Favorite
Protecting Your Agency's Data in the Di...
Whether you're a seasoned database administrator or new to SAP ASE, SAP IQ, and SAP ASPE, this webinar provided valueable insights applicable to all levels of expertise. In this webinar, attendees: Gained insights into the security features in SAP ASE, SAP IQ, and ASPE Discovered products, proven strategies, and techniques that enhanced attendees security posture Engaged with Wayne Waldrup our seasoned database expert during our Q&A sessio...
Add Favorite
Tungsten Automation and Optima Webinar
Download this Tungsten Automation and Transcend AP webinar for a hands-on session that is specifically designed for higher education institutions. Attendees delved into how automating your AP workflow can unlock significant benefits such as: Cognitive Capture (AI & ML) of Invoices: Say goodbye to manual data entry! Attendees learned how Tungsten Auomation and Transcend AP our intelligent technology automatically extracts and categorizes in...
Add Favorite
Navigating Regulatory Frameworks for Ex...
In an era where digital transformation is integral to how we do business, the significance of adhering to compliance frameworks and mitigating associated risks cannot be overstated. Organizations face the dual challenge of ensuring they are resilient against threats while also remaining compliant with an evolving landscape of regulatory requirements. Attendees joined for a strategic session that delves into the essentials of the Risk Managemen...
Add Favorite
Integrating SBOM and Vulnerability Resp...
The visibility that a Software Bill of Materials (SBOM) gives into the ingredients that make up software components is critical to understanding cybersecurity risks. But understanding is only part of the solution. Organizations need to be ready to act on vulnerabilities before they impact system security. Attendees joined ServiceNow to examine the synergies between ServiceNow's Vulnerability Response framework and the principles underpinning C...
Add Favorite
Tableau Enablement Series Part 5: Secur...
In today's data-driven landscape, ensuring the security of your analytics environment is paramount. Join our webinar to enhance your Tableau security expertise and explore how cybersecurity principles intersect with Tableau's features to ensure secure data access for your users. During this webinar, attendees learned how to: Step up their Tableau security game: Attendees learned how to leverage Tableau's built-in features to secure their analy...
Add Favorite
Back to Search Begin New Search