Back to Search Begin New Search Save Search Auto-Notify
Protect Your Students and Data from Cyb...
Carahsoft and iboss had an informational webinar on the features and benefits of implementing an E-Rate eligible Firewall-As-A-Service (FWaaS). The iboss Zero Trust Edge (ZTE) FWaaS platform can help protect students and data from cyber-attacks. It includes a wide range of advanced features, such as: Advanced Threat Protection (ATP) Cloud App Firewall and Monitoring Intrusion Prevention System (IPS) Advanced Antimalware Defense Domain Name Sys...
Add Favorite
The Future of Cloud and Government: How...
The tech trends of today are foreshadowing three disruptive shifts of tomorrow—ubiquitous computing, AI co-reasoning, and quantum at scale. These forces are collectively shaping the future direction of the cloud and will enable innovation that transforms government and society in the coming years. Watch this on-demand webinar where Microsoft will look more closely at the ground-breaking innovations that will influence the trajectory of g...
Add Favorite
Embrace the Power of NinjaOne
IT leaders in state and local governments face unique challenges in supporting diverse agencies efficiently. By choosing and leveraging the right tools effectively, they can streamline endpoint management, reduce costs, improve services, and free up time for strategic IT projects, enhancing overall operational efficiency. NinjaOne is the leading unified IT management platform that simplifies IT workflows thanks to powerful automation capabili...
Add Favorite
Illuminating the Darknet for Government...
Thank you for your interest in this event. Attendees of this on-demand webinar learned how the darknet can be used to: Track illicit sales of drugs, human trafficking, and cyber weapons Detect potential threats and monitor persons of interest Stay one step ahead of foreign Nation-State adversarial activity and attacks Learn the latest tactics, techniques, and procedures of threat actors to better prevent future cyberattacks on critical infrast...
Add Favorite
JADC2 Intelligent Automation Exoskeleto...
This on-demand webinar explored the innovative integration of UiPath’s cutting-edge automation and AI capabilities to create an 'Automation Exoskeleton' for intelligence analysis. These solutions are designed to augment and enhance the efficiency of intelligence analysts in processing and interpreting vast and complex datasets and reducing the pain of the intelligence-publication process. With this technology, the speed and accuracy of t...
Add Favorite
Embracing A Data-Driven Approach To Cyb...
Understanding what devices exist in your environment is the foundation to security. Identify compliance gaps and risks for all IP connected assets regardless of if they are managed or unmanaged. Where are you today with your Asset Management mission? Allow Armis to provide you real-time visibility and control over every asset connected to your network. The overview of the platform focused on: Discovering and managing an accurate, unified and...
Add Favorite
Data-Driven Solutions for Substance Use...
Inappropriate opioid prescribing has fueled one of the deadliest drug epidemics in US history. Though most opioid-related overdoses involve prescription opioids, an increasing number is linked to illicit opioids such as heroin and fentanyl. Download this on-demand webinar to learn how Egen and Salesforce’s cloud-based solution enables cross-agency data-sharing initiatives to: Generate insights about contributing factors to the opioid epi...
Add Favorite
Exploring Software Risk Management for...
Securing sensitive data and critical systems is crucial. Software risk management and application security strategies identify and mitigate vulnerabilities, ensuring compliance with industry standards for enhanced public sector cybersecurity. Synopsys experts taught attendees to understand how Application Security Posture Management (ASPM) and Software Risk Management (SRM) can help your organization more effectively comply with software secur...
Add Favorite
The AI Revolution – Transforming Email...
As cyber threats become more frequent and sophisticated, the adoption of Artificial Intelligence (AI) is reshaping the landscape of email security. This webinar will delve into key aspects of the AI revolution and its pivotal role in protecting against highly sophisticated attacks. Attendees joined Mimecast and Carahsoft to learn: What AI is and What It's Not Benefits of Deploying AI in Cybersecurity Tools Challenges in AI-Powered Threat Detec...
Add Favorite
2023-2024 Annual SLED Cybersecurity Pro...
Attendees joined us to dive into cybersecurity trends in SLED, their implications, and opportunities for their organization. They heard from SLED IT leaders and experts to learn about approaches to the benefits and challenges of implementing a Whole of State cybersecurity program, strategies and best practices for retaining and developing cyber talent, different methodologies around how SLED leaders are budgeting for cyber insurance, and techn...
Add Favorite
Back to Search Begin New Search