Back to Search Begin New Search Save Search Auto-Notify
Modernizing Government ERP Systems to I...
Enterprise resource planning (ERP) systems are integral to streamlining operations and centralizing data. But rigid architecture can make it difficult to adapt to modern technologies or tailor to evolving mission requirements. And upgrading ERP systems can be lengthy, disruptive, and costly. Attend this webinar to explore a proven approach to ERP modernization: a low-code agility layer to unlock adaptability and empower business users to drive...
Add Favorite
Splunk Attack Analyzer Webinar
Participants joined us for a webinar with Splunk to learn how Splunk Attack Analyzer can help them. Splunk Attack Analyzer automates the analysis of suspected malware and credential phishing threats. Unlike other analysis tools that require cumbersome manual workflows, the solution automatically follows and analyzes each step in complex attack chains to get to the final payload. Splunk Attack Analyzer renders a verdict and extracts forensics t...
Add Favorite
Babel Street GEOINT Webinar
Learn how to ensure your geolocation data is up-to-snuff and empowers, not hinders, your analysis! Geolocation analysis offers a powerful tool for understanding spatial trends and patterns. However, the accuracy and reliability of derived insights fundamentally depend on the data quality. Rarely does the required data come off the shelf and ready for analysis without additional cleansing, enriching, and standardizing. Attendees of this webinar...
Add Favorite
Rethink Your Contact Center with CloudHesive
On Thursday, June 6, CloudHesive, Amazon Web Services (AWS) and Carahsoft hosted an engaging webinar on the dynamic world of contact centers. Navigating attendees through the latest transformations in contact center operations and learning strategies to thrive in this ever-evolving industry. Attendees of the webinar left with a deeper understanding of:The contact center spaceThe ConnectPath CX solution and its benefitsCurrent trends in contact...
Add Favorite
Implementing Zero Trust Controls and Mo...
Cybersecurity compliance frameworks are curated with the most effective methodologies an organization can take to prevent cyberattacks and reduce the impact if one occurs. If passed in current form, NIST 800-171A Rev.3 final public draft will adopt substantial changes to existing compliance controls required by the Cybersecurity Maturity Model Certification (CMMC). All those within the Defense Industrial Base will be required to observe substa...
Add Favorite
Gemini for Google Workspace: Developing...
Gemini for Google Workspace is a powerful collaborative partner that can act as an effective prompt, thought partner, source of accuracy and productivity booster—all while ensuring every user and organization has control over their data. In this session, attendees learned about:Leveraging generative AI for enhanced efficiencyPrioritizing public sector use cases for maximum impactPractical examples and best practices tailored to governmen...
Add Favorite
Lunch Bytes Webinar Series
Instead of settling for a regular break, participants joined Dynatrace online for Lunch Bytes, a snackable series of easily digestible events covering today's leading technology topics. Participants upgraded their lunch time with Public Sector Solutions Engineer, Matt Gardner, as he shared tactical insights and practical use cases on the following topics across four 30-minute sessions.
Add Favorite
Federal TX Practitioners Workshop
Attendees heard directly from product management and took away improved skills and knowledge to be successful with Strategic Portfolio Planning, Investment Funding, Innovation and Demand Management, Project Management, and Agile Development. Topics Covered Include:What’s new in SPM?Roadmap Strategy: How to create a strategic plan and fund investments to maximize outcomes.Align Investments: How to align investments to implement strategy,...
Add Favorite
Piercing the Near-Peer Cyber Perimeter:...
In today's world, protecting national security requires understanding the global cyber operations landscape, particularly the activities of Great Powers countries. SpyCloud's Identity Intelligence offers a unique perspective into this challenging space, helping to uncover the tactics and trends used by advanced actors. This event showcased an in-depth analysis of compromised data, revealing connections beyond traditional near-peer threats.Acce...
Add Favorite
Optimizing IT Operations: Advanced ITSM...
U.S. Federal Government agencies need flexible software solutions capable of optimizing IT operations. By integrating Atlassian's enterprise tools into existing IT environments, teams can create customizable workflows to fit their specific needs. On June 12, Atlassian experts discussed how to:Integrate scalable tools like Jira Service Management into your workflowAutomate repetitive tasks with proven scalable strategies to free up your IT staf...
Add Favorite
Back to Search Begin New Search