Back to Search Begin New Search Save Search Auto-Notify
An Introduction to Advanced Analytics
Watch this Alteryx hands-on-lab for an interactive session on conducting end-to-end analysis. Two Alteryx Sales Engineers, unpacked how federal, state, and local agencies are utilizing data driven approaches to enhance their operations, including reconciliation, risk assessment, and data deduplication. After a brief introduction to the possibilities, attendees get hands-on and learn how to apply the techniques for themselves. Attendees learned...
Add Favorite
Locked and Loaded: Navigating Ransomwar...
Arete is transforming the way organizations prepare for, respond to, and prevent cybercrime. Their team responds to thousands of ransomware incidents and helps organizations get back up and running after attacks. By collecting data from these incidents, they create unparalleled insights into the ransomware landscape. They focus on security so you can focus on serving your customers and communities. Ransomware is a threat to businesses, governm...
Add Favorite
Create Your Strategic Approach for the...
As the government's fiscal year comes to an end, there becomes a sense of urgency to bid and capture as many awards as possible. However, this detracts contractors from their core competencies and they begin chasing anything and everything to get their piece of the pie. Join us for a discussion with Ashley Duwel, CEO of Duwel Dev LLC, to help implement a strategic approach for the year-end flood of opportunities.
Add Favorite
Dataiku for Government - Striking a Bal...
Attendees of this on-demand webinar will have learned: The challenges and opportunities of integrating AI across the enterprise while ensuring trustworthiness, governance, and collaboration The opportunity to experience a demo of Dataiku where they witnessed firsthand, the power of the platform in enabling organizations to harness the full potential of AI How the flexible and interactive user interface empowers both data and domain users alike...
Add Favorite
Get Started with E-Rate
During this on-demand webinar our expert discussed the E-Rate program. Download the on-demand recording to discover: Eligible products and services Discount rates and annual program caps Compliancy and best practices
Add Favorite
Extending the Lifespan of Legacy .NET A...
.NET Framework spurred on the tremendous growth of web applications when it was released in 2002. Since that time, millions of developers have utilized the platform to build out mission critical applications. In 2016, Microsoft launched .NET Core which bifurcated the .NET application landscape down 2 parallel paths. While .NET Core does offer advantages over .NET Framework, the time and cost required to refactor applications may not make sense...
Add Favorite
Streamline the Adoption of Next-Generat...
This on-demand webinar explored the evolution of technology in public safety and how you can ensure you take advantage. Prepared aims to lead the charge in modernizing the safety systems of the future. By unlocking the full potential of everyday technology, Prepared makes emergency communication faster, more accessible, and introduces information that has never been utilized for emergency response before. Download now to immerse yourself in a...
Add Favorite
The Missing Piece in Change Management
Successful implementation of organizational change is critical for state, local and federal agencies to realize their respective missions. The pace of organizational change is only increasing in the public sector, making organizational change capacity even more important over time. Despite making massive investments in change management resources and practices over the past few decades, agencies are not seeing the results. The missing piece to...
Add Favorite
Mobile Devices and Consent: Building Tr...
Collecting forensic data on-scene can come with a number of potential ethical and practical challenges when incorporating technology into interactions with victims and witnesses. Access this on-demand webinar to explore the critical intersection of technology, consent, and empathy. This webinar aims to equip participants with the knowledge and skills needed to navigate mobile encounters responsibly, fostering an environment of trust and suppor...
Add Favorite
Kickstart to Compliance Series: The Jou...
We wrapped up our journey to achieving optimal level of the ZTA data pillar in the third and final session in the Kickstart to Compliance Series. This session focused on three key functions, including: access determination where we introduced dynamic data masking to provide least privilege techniques to data access, visibility and analytics capability to showcase DPM’s user access monitoring and user anomaly detection trending/visualizat...
Add Favorite
Back to Search Begin New Search