250 webcasts found
+ 131 past events found
Back to Search Begin New Search Save Search Auto-Notify
Transforming State and Local Government...
RiskRecon & Carahsoft hosted an illuminating webinar that went beyond theory and equipped attendees with practical tools and knowledge to revolutionize third-party cyber risk management.
Add Favorite
Trellis Data's Secure Speech: Secure Tr...
In the age of AI, government agencies need an accurate, efficient, and flexible speech-to-text service customizable for specific use cases, languages, dialects, and environments while maintaining full data custody. Attendees discovered Trellis Secure Speech's powerful user features including keyword searching, real-time alerts, dynamic speaker ID, language identification, and translation between multiple languages. Additionally, attendees lear...
Add Favorite
Take home the GOLD with Veeam Data Protection
Join us for an interactive LEGO experience with Jeff Reichard, Vice President Solution Strategy at Veeam who showed Veeam's latest integrations allowing you to combine secure data protection with your existing security toolset and Adam Ward, LEGO extraordinaire, who simultaneously guided us through the assembly of an Olympics-themed LEGO model to inspire your data security efforts.
Add Favorite
Modernizing for Future-Proof Flexibilit...
In this webinar, attendees got to hear:How Pima, AZ got started the daunting task of modernizing its data infrastructure with Qlik and SnowflakeHow Qlik Data Integration and Snowflake started the journey on-premise and have created the foundation for Pima County’s continued modernization efforts with 10+ systems moved to Snowflake with sub-second replicationThe outcomes Pima County has seen since modernizing in its data movement, integra...
Add Favorite
Leveraging Tableau Stories and Dashboar...
CoSN has unveiled its groundbreaking Digital Equity Dashboard with data curated by Innive K12 360� to empower school districts and communities to harness data in their pursuit of bridging digital equity gaps. This robust dashboard, created in Tableau and leveraging the power of Tableau Data Prep, seamlessly amalgamates multiple national datasets, presenting them within a singular, cohesive dashboard. This webinar explored the transformative po...
Add Favorite
Using AI to Prevent Data Loss and Email...
A comprehensive approach to stopping sensitive data loss combines a traditional rules-based approach with behavioral AI. Organizations face substantial security risks from misdirected emails and data exfiltration, leading to increased labor costs for investigations, regulatory reporting, and compliance communications. As a key conduit for sensitive data, email can expose businesses to regulatory fines, reputational damage, and customer loss. T...
Add Favorite
Defend Smarter: Leveraging AI to Maximi...
Are you struggling to keep up with ever increasing security compliance and regulatory requirements? Is your team tired of manually intensive and labor some work for keeping up compliance efforts? Unlock the potential of automated and continuous security compliance and risk management to fortify your organization's defenses. Attendees joined us to learn more about:Regulations and industry standards driving cybersecurity efforts in the public se...
Add Favorite
Using the Right Data for Compliance and...
Navigating the federal contracting process poses significant challenges for government contractors particularly in the areas of compliance, performance management and contract close-out. The sheer volume of data available often overwhelms contract managers, leading to uncertainty about which data points are pertinent for measuring performance to ensure compliance requirements are met. Watch this on-demand webinar to learn how Icertis and Accen...
Add Favorite
How to Hunt for Volt Typhoon Malware in...
The federal government has strenuously and repeatedly stated that critical infrastructure providers must be proactive in hunting for malware that may be present in networks, focusing specifically on CCP-sponsored Volt Typhoon Adversary. Attendees joined critical infrastructure experts for a panel discussion on how to hunt for Volt Typhoon. Discussion topics included:How Four18 Intelligence uses UnknownCyber ThreatHunter to hunt for Volt Typhoo...
Add Favorite
Tableau Enablement Series Part 6 - Clea...
In an era where data-driven decision-making is paramount, the integrity and trustworthiness of your data are more crucial than ever. This webinar was designed to empower attendees with robust data preparation techniques, ensuring that their datasets are not only clean and well-structured but are also reliable and AI-ready. During this webinar, attendees learned how to:Transform raw data into trustworthy assets using Tableau Prep, ensuring thei...
Add Favorite
Back to Search Begin New Search