Back to Search Begin New Search Save Search Auto-Notify
Splunk Security Essentials App Virtual...
This event provided a hands-on and interactive workshop designed to empower attendees with the skills to navigate and utilize Splunk's free Security Essentials app effectively. This modular workshop, centered around the Boss of the SOC (BOTS) dataset, provided practical insights into real-world security scenarios. During this virtual workshop, attendees learned:Practical Setup and UsageGained hands-on experience setting up and navigating Splun...
Add Favorite
Rebooting IT: Automations Essential Role
Modern IT leaders are facing a critical market demand: automate, or be left behind. Regardless of where you are in your IT modernization journey, creating an enterprise-wide approach to automation can help you optimize your IT processes and teams. Join Red Hat online for real-world use cases and examples of organizations that are leveraging Red Hat Ansible Automation Platform to fulfill their IT automation needs. This webinar, led by the Red...
Add Favorite
Transforming Municipal Operations with...
Attendees dove into the City of New Britain's workspace journey. This on-demand webinar went over: Key Factors Driving Migration Strategies for Seamless Transition Change Management Best Practices Google Workspace Features for Enhanced Collaboration and Service Delivery Partnership with Google Cloud Premier Partner, Dito Notable Benefits and Unexpected Outcomes
Add Favorite
Modern Device Management for the Warfighter
Thank you for your interest in our Ivanti webinar: Modern Device Management for the Warfighter Unfortunately, this webinar is now over. We're sorry we missed you! In this webinar, attendees learned about: DMUC and protective security features Endpoint Mobility Modernization for the warfighter The future of mobile endpoints in the DoD DoD personnel with personal mobile devices and adopting a BYOAD program Register to view this on-demand recording.
Add Favorite
Taming the Data Dragon: Exploring the C...
Carahsoft & Exterro hosted a webinar on Tuesday, February 27th, 2024. With the continued rise of public records requests, data volumes have turned into a beast. Government agencies are facing a series of battles when it comes to FOIA requests, regulatory compliance, investigations, data deletion policies, and strict deadlines. To have a fighting chance, teams will need to know where data lives, who has access to it, and which regulations i...
Add Favorite
Unveiling Top Cloud Exploits and Cyber...
For more than 10 years, agencies have been shifting their digital footprint to cloud computing. The ability to rapidly scale solutions in a cost-effective manner allows any agency to enhance its agility, improve application release timelines, and leverage additional computing resources on demand. While this has changed how agencies manage their IT assets, the need for security remains just as strong. Throughout 2023, the Threat Research Unit a...
Add Favorite
Event Reporting in Smartsheet Gov
During this session, Smartsheet Senior Security Solutions Engineer, David Lewis, walked participants through what integration can look like with Event Reporting and how to set up the software for the policies being monitored. Participants learned the commands a government IT team can use to monitor for data exfiltration with Event Reporting in Smartsheet Gov and how Smartsheet Gov can help organizations get more awareness and visibility into h...
Add Favorite
Bridging the Largest Threat Visibility...
Attendees of this webinar learned: A better understanding of the email threat landscape Ways they can leverage threat intelligence in their maturing approaches to anticipating rather than merely reacting to the threats they face Register to view this on-demand recording.
Add Favorite
Tableau 2024 Kick-off Webinar
This webinar gave attendees the opportunity to grow and enrich their data skills by connecting with their Tableau Team and fellow Tableau Users. Attendees were able to learn what’s new with Tableau and events to look forward to in the coming months. During this on-demand webinar, attendees were able to: Learn & grow - Discover the new features of Tableau 2023.3 and learn how those new features can take reporting to the next level Be...
Add Favorite
Adopting Least Privilege Principles to...
Endpoint security serves as the frontline defense in protecting your organization's network from a wide array of threats originating from devices that connect to the enterprise network, such as laptops, smartphones, and tablets. These endpoints are often the targets of cyberattacks as they provide access points to the organizational network, making them vulnerable to malware, ransomware, phishing, and other sophisticated attacks. By securing t...
Add Favorite
Back to Search Begin New Search