384 webcasts found
+ 681 past events found
Back to Search Begin New Search Save Search Auto-Notify
How to Fast-Track Your Agency's Infrast...
Congressional funding is right around the corner which means project and approval timelines are shrinking, and different project groups are often vying for priority. With many public works projects competing for funds, it is important to quickly and effectively rally stakeholders and citizens behind a single vision of your proposed infrastructure project and its impact. However, unifying different points of view often requires using different...
Add Favorite
Simplifying IT Security for the Classro...
Back to business as usual: Ensuring your WAN is secured with GCOM, Fortinet SD-WAN and Carahsoft Network engineering and operations leaders have struggled to incorporate digital innovation initiatives at branch and remote locations due to the limits of traditional WAN infrastructure. SD-WAN is increasingly seen as the solution for addressing these problems. Join Fortinet, GCOM and Carahsoft as we explore a true secure SD-WAN solution to help g...
Add Favorite
Transforming For The Age of Digital Inv...
Every day around the world, digital data is impacting investigations. Making it intelligent and actionable is what Cellebrite's Intelligence Investigative Platform does best. With an ever-growing variety of digital devices and cloud sources producing volumes of highly valuable data, investigators need intuitive solutions and training to leverage this critical source of evidence when resources are limited. Join us on Thursday, July 29th for a l...
Add Favorite
Surveillance Off-Grid: Deploying Hybrid...
New surveillance technology and smart analytics allow technology to supplement and sometimes even replace physical security guards. Deploying this technology has the potential to make a facility much more secure, but security experts have a tendency to neglect the most vulnerable areas because of local power or connectivity issues. In a world where the power grid is increasingly unreliable, we'll explore new technology solutions that allow for...
Add Favorite
Analyzing Data: An Enterprise Resource...
The Congressional Research Service noted a decade ago that, “Intelligence is valuable only if it can be shared with consumers who need it, but, to the extent that it is more widely shared, risks of compromise are enhanced.” That report was prompted in part by 9/11. In the twenty years since, “need to know” has become “need to share” throughout the federal government as agencies have come to realize the value...
Add Favorite
Prevent & Detect Business Email Comprom...
BEC attacks on city, state, local governments and educational institutions is a major cyber threat hitting organizations today. Across the nation, these attacks present a significant and unique challenge for resource-strapped local governments and educational entities. The FBI reports that 51% of all Cyber losses originate with BEC. Security leaders need strategies that help mitigate these common attacks and get ahead of threat actors today -...
Add Favorite
Powerful Water Modeling on Virtually An...
Water system design and analysis can be costly, time consuming, and challenging for municipal agencies. The combination of CAD, GIS, simulation and analysis features needed to produce a useful model usually means bouncing between different technologies and platforms. Often, it's a marginal CAD-enabled platform that requires export to a GIS platform, or a limited bolt-on tool that is tied to a GIS platform, neither supporting the iterative need...
Add Favorite
Fraud Beyond the Pandemic: The Role of...
Public sector agencies’ digital strategies were put to the test by the pandemic. With legacy and manual systems pushed to their limits by the new digital age, agency leaders were faced with the unprecedented task of scaling digital solutions which suddenly became the default channel for millions of interactions with the population. Public sector professionals stepped up to the challenge. However, as the effects of the pandemic ease, indi...
Add Favorite
(ISC)2 CCSP | Certified Cloud Security...
The (ISC)² Certified Cloud Security Professional (CCSP) credential to ensures that cloud security professionals have the required knowledge, skills, and abilities in cloud security design, implementation, architecture, operations, controls, and compliance with regulatory frameworks. The CCSP OnDemand is a self-paced learning solution that covers the 6 domains of the CCSP Common Body of Knowledge (CBK) in order to study for the CCSP examin...
Add Favorite
Scaling Digital Defenses: The Building...
Government agencies continue to expand their digital service offerings, making it easier than ever before for the public to access critical benefits and services online. However, this rapid expansion of digital services has opened the door to unprecedented identity fraud and abuse, costing billions of dollars. In many cases, additional customer friction was introduced for identity verification processes as a mechanism for reducing fraud. But t...
Add Favorite
Back to Search Begin New Search