Back to Search Begin New Search Save Search Auto-Notify
Analyzing Data: An Enterprise Resource...
The Congressional Research Service noted a decade ago that, “Intelligence is valuable only if it can be shared with consumers who need it, but, to the extent that it is more widely shared, risks of compromise are enhanced.” That report was prompted in part by 9/11. In the twenty years since, “need to know” has become “need to share” throughout the federal government as agencies have come to realize the value...
Add Favorite
Powerful Water Modeling on Virtually An...
Water system design and analysis can be costly, time consuming, and challenging for municipal agencies. The combination of CAD, GIS, simulation and analysis features needed to produce a useful model usually means bouncing between different technologies and platforms. Often, it's a marginal CAD-enabled platform that requires export to a GIS platform, or a limited bolt-on tool that is tied to a GIS platform, neither supporting the iterative need...
Add Favorite
Fraud Beyond the Pandemic: The Role of...
Public sector agencies’ digital strategies were put to the test by the pandemic. With legacy and manual systems pushed to their limits by the new digital age, agency leaders were faced with the unprecedented task of scaling digital solutions which suddenly became the default channel for millions of interactions with the population. Public sector professionals stepped up to the challenge. However, as the effects of the pandemic ease, indi...
Add Favorite
(ISC)2 CCSP | Certified Cloud Security...
The (ISC)² Certified Cloud Security Professional (CCSP) credential to ensures that cloud security professionals have the required knowledge, skills, and abilities in cloud security design, implementation, architecture, operations, controls, and compliance with regulatory frameworks. The CCSP OnDemand is a self-paced learning solution that covers the 6 domains of the CCSP Common Body of Knowledge (CBK) in order to study for the CCSP examin...
Add Favorite
Scaling Digital Defenses: The Building...
Government agencies continue to expand their digital service offerings, making it easier than ever before for the public to access critical benefits and services online. However, this rapid expansion of digital services has opened the door to unprecedented identity fraud and abuse, costing billions of dollars. In many cases, additional customer friction was introduced for identity verification processes as a mechanism for reducing fraud. But t...
Add Favorite
2022 - FAR Supplement - DIAR - Interior
FAR Agency & Department Supplement - Webinar Series Complimentary & Recorded Find recordings on our website and YouTube Channel Sponsorships available at [email protected]
Add Favorite
The U.S. Securities and Exchange Commis...
The U.S. Securities & Exchange Commission recently proposed rules to strengthen the ability of public companies, funds, and advisors to combat cybersecurity threats and implement risk mitigation processes. SecurityScorecard was joined by Kristy Littman, U.S. Securities and Exchange Commission Chief of the Crypto Assets and Cyber Unit, Michael Daniel, President & CEO of the Cyber Threat Alliance and Friso van der Oord, Senior Vice Presi...
Add Favorite
What Is A PTAC & How They Help Federal...
Join us in this complimentary webinar to learn: What is a PTAC? How many are there in the US? How are they organized? Is there an HQ organization? Link? How are they funded? Who do they help? What services do they offer?
Add Favorite
What is SBDC & How They Help Federal Co...
Join us in this complimentary webinar to learn: What is SBDC? How many are there in the US? How are they organized? Is there an HQ organization? Link? How are they funded? Who do they help? What services do they offer?
Add Favorite
What Is SCORE & How They Help Federal C...
Join this complimentary webinar to learn: What is SCORE? How many are there in the US? How are they organized? Is there an HQ organization? Link? How are they funded? Who do they help? What services do they offer?
Add Favorite
Back to Search Begin New Search