Back to Search Begin New Search Save Search Auto-Notify
The Benefits of Moving to a Complete St...
A Complete Streets design model ensures that transportation planners and engineers consistently plan, design, operate, and maintain the entire roadway and roadway networks with all users in mind — including bicyclists, public transportation vehicles and riders, and pedestrians of all ages and abilities. Complete Streets can incorporate a wide range of elements, such as sidewalks, bicycle lanes, bus lanes, crossing opportunities, median i...
Add Favorite
Siren 13: High Fidelity Reports, 2x Sea...
The Siren 13 platform is now twice as fast with a simplified interface to allow for a better analyst experience. This improved search speed along with advanced features such as category icons will provide an overall better analyst experience with better intelligence products. Watch the on-demand webinar where we demonstrate the Siren 13 platform's new features and how they can improve the user experience (UX) of investigators. Investigators no...
Add Favorite
Starting Your Electrification Journey:...
Transitioning to electric vehicles (EVs) doesn’t have to be a headache, but instead an opportunity to save money and save the planet. Agencies everywhere are moving to electric due to regulatory requirements and sustainability goals. In addition to these factors, there’s another major reason to start your electrification journey – EVs offer a lower cost of delivering people, goods, and services. Watch this on-demand webinar t...
Add Favorite
The New Cybersecurity Strategy - What Next?
We invite you to watch our webinar that occurred on May 24th, which aimed to provide solutions to the challenges posed by implementing current mandates, executive orders, and the new cybersecurity strategy. Navigating the complexities of implementing these measures can be a daunting task, and we at Veracode understand the difficulties faced by government agencies. Our esteemed panelists, Sam King, Chris Wysopal, and John Zangardi, are industry...
Add Favorite
Power Zero Trust Outcomes with Trellix
With the Zero Trust Maturity Model as our guide, Trellix invites Federal Agencies to learn about what strategic investments can be made today to help reach long term Zero Trust goals. During this on-demand session attendees learned about: How XDR can help with the maturity progress across multiple pillars. How to leverage existing investments to achieve Zero Trust outcomes The importance of contextualizing data from multiple sources to surface...
Add Favorite
The Business of Ransomware
Did you know there’s an entire underground economy around ransomware? In this webinar, Halcyon explained how Ransomware-as-a-Service (RaaS) groups operate, what an affiliate is, and how Initial Access Brokers (IABs) are the glue that holds them all together. The ransomware economy constantly changes, with groups disbanding or taking market share from competitors from quarter to quarter. Who will be crowned top dog in 2023? What you got o...
Add Favorite
Secure Applications and Data to Prevent...
Data security is always of utmost concern; today, we're reimagining security for a hybrid cloud future. Many traditional infrastructure stacks are comprised of products from multiple vendors, each decoupled from the stack, providing a narrow and limited view of security. Validating and maintaining a security baseline through continuous software upgrades is time-consuming and often involves error-prone manual processes that take away from innov...
Add Favorite
TechNet Cyber 2023 Webinar Series: Prev...
Proofpoint and Carahsoft invited individuals and their cybersecurity teams to join them in an overview of TechNet Cyber 2023. Attendees learned how Proofpoint's people-centric solutions can improve current and future cyber threats. At the end of February, CISA released a Red Team analysis report that highlighted the need for agencies and organization to detect lateral movement techniques, train users on how cybercriminals leverage human-based...
Add Favorite
Enhancing Cyber Security Operations Lev...
As skilled cyber labor resources become scarce, and target attack surfaces increase, XDR technology provides the ability to correlate email, endpoint, server, cloud, workload, and network sources for stronger detection and greater insight. A roadmap to consolidating siloed point solutions provides alert prioritization, automotes many security workflows, and decreases time to detection and remediation of threats. In this on-demand webinar, atte...
Add Favorite
Prescriptive Analytics is the Last Mile...
Agencies need a platform that fully leverages all their data to become truly data-driven and meet mission-critical goals. Yet, many analytics initiatives do not reach the point of decisions, only insights and outputs that don't truly help solve the question, “How do we make it happen?” To address this issue, Pyramid Analytics added Tabulate, a powerful new business modeling module; and Solve, a decision modeling and optimization pl...
Add Favorite
Back to Search Begin New Search