Back to Search Begin New Search Save Search Auto-Notify
How to Drive Fearless Generative AI Ado...
Attendees joined Portal26 on September 12th as their CEO discussed how, in just 15 minutes, you can answer these key questions and more through the Portal26 GenAI governance & security management platform.During this webinar, attendees learned:Levels of risk you can’t currently see when trying to manage and secure GenAIHow to leverage and fill the security gaps in your existing Zscaler Secure Web Gateway to be a secure GenAI governan...
Add Favorite
Migrating VMs to Red Hat OpenShift
Migrating virtual machines (VMs) to Red Hat OpenShift Container Platform simplifies the transition to a modern, containerized environment, enhancing scalability, efficiency and application management across hybrid and MultiCloud infrastructures. Red Hat and Unilogik hosted a live virtual demonstration showcasing how your agency can leverage Red Hat OpenShift for streamlined VM management. In this webinar, attendees learned how to:Evaluate your...
Add Favorite
Securing Your IoT Devices Across the Pu...
Attendees of this webinar were able to:Explore the importance of IoT security in the public sectorLearn about Zero Trust principles and their application to IoT ecosystemsDiscover how security solutions from Palo Alto Networks provide visibility, control and security for your digital assets
Add Favorite
Managing AI Risks: Ensuring Safe and Co...
iboss hosted their webinar, Managing AI Risks: Ensuring Safe and Compliant Use of Chat GPT on Thursday, September 12th. Attendees learned about the critical need for secure AI implementation in local government agencies. The iboss ChatGPT Risk Module provides comprehensive security controls to manage and mitigate risks associated with AI-driven technologies. Our iboss speakers, Christopher Park and Kelvin Quezada, discussed best practices for...
Add Favorite
CyberMaxx CISO's View
This webinar covered themes including: Trends the CISO is experiencing The current Geopolitical situation, AI and moreKey Ransomware and threat actor activities
Add Favorite
Zoom NJSBA Webinar: Limitless Human Con...
On September 12th, Carahsoft and the New Jersey School Boards Association (NJSBA) hosted a focused K-12 webinar that brought together key insights into the evolving landscape of educational technology. During this session, Zoom showcased their cutting-edge solutions that are driving academic restart, recovery, and success in schools. In collaboration with Eastern Datacomm, a leader in K-12 communication technology, the webinar provided valuabl...
Add Favorite
Scan to Solve: ADF's New Features for E...
Access this on-demand webinar to join Rich Frawley, the Director of Training at ADF Solutions, as he uses ADF PRO to walk you through ADF's top new features for computer and mobile forensic investigations. See ADF PRO in action as Rich demonstrates its powerful capabilities and comprehensive results, whether you're conducting your investigations on-scene or in the lab. Specifically, this webinar will walk you through features such as:New Featu...
Add Favorite
Transforming Institutional Research Wit...
In this on-demand webinar, Alteryx showcases how data analytics automation is revolutionizing institutional research at the University of Pittsburgh and Indiana University Online. Explore key trends, methodologies, and best practices in data-driven decision-making and student success. Hear from Heather Harris, Alteryx’s Field Chief Data and Analytics Officer, as she discusses the transformative impact of Alteryx’s solutions on stre...
Add Favorite
Open Source in Action
Red Hat hosted a virtual event on Monday, September 16, 2024 at 2:00pm ET. Red Hat experts broke down the essentials of products like OpenShift, Ansible and Red Hat Enterprise Linux, providing you with insights to maximize your IT infrastructure.
Add Favorite
Building Student-Led SOCs in Higher Education
Higher Education Security Teams are often understaffed, underfunded, and at greater risk for cybersecurity threats. While many schools recognize the potential of student internships from their Cybersecurity programs, they often struggle with the management and training required to integrate these students into their Security Teams. This webinar showcased how LSU formalized its Student Led SOC program to create a framework that trains students...
Add Favorite
Back to Search Begin New Search