Back to Search Begin New Search Save Search Auto-Notify
DoDIIS Worldwide Webinar Series: Three...
The increasing sophistication of cyber threats, especially those targeting critical infrastructure, has catalyzed a national directive for enhanced cybersecurity measures, as signified by Executive Order 14028. Nation-state actors and other advanced threats are exploiting software supply chains with such efficacy that the integrity of our critical systems is at constant risk. The diverse and complex nature of the software utilized by agencies...
Add Favorite
Modernizing Digital Experience with Con...
Content velocity is more important than ever as agencies strive to continuously deliver effective digital experiences and compelling content across a diverse landscape of devices and through multiple channels. The ability to create, find, and deliver the right digital assets, for the right context, at the right time is crucial to successfully engaging your audience. Access this on-demand webinar, Modernizing Digital Experience with Content Vel...
Add Favorite
Hopewell Police Department Tackles Crim...
The Hopewell Virginia Police Department relies on dependable security systems for crime prevention and swift incident response, but inaccessible power and traditional infrastructure constraints were hindering their technology deployments. Webinar attendees discovered how Gridless Sentry's advanced battery and connectivity platform helped the Hopewell Police Department achieve continuous operation of their security technology with a reliable of...
Add Favorite
Accelerating Authorization Capabilities...
Navigating the complexities of Identity, Credential, and Access Management (ICAM) can feel like a maze of acronyms – ABAC, PBAC, CBAC, oh my! Attendees joined for an insightful webinar where Bryan Rosensteel, Ping Identity's US Federal CTO, unravelled the intricacies of ICAM and shed light on fine-grained access control within a modern Zero Trust architecture. During this on-demand webinar, Bryan shared invaluable insights on: Decoding t...
Add Favorite
Safeguard Your CI/CD Environments Again...
Government agencies handle a vast amount of sensitive data and are often targeted by sophisticated cyberattacks. Therefore, ensuring the integrity and security of CI/CD environments is crucial to preventing unauthorized access, data breaches and potential disruptions in critical systems. During this on-demand session, GitLab & AWS discussed how robust security measures in these environments can help government agencies maintain public trus...
Add Favorite
CMMC: A New Year with New Resolutions
This virtual discussion featured Matt Travis, CEO of The Cyber AB – the official accreditation body of CMMC – and an expert panel discussing updates to the CMMC program and key insights on: Perspectives from CMMC ecosystem experts, including perspectives from Matt Travis, CEO of The Cyber AB who will weigh in on the current status of the CMMC rule. Real-world experiences and challenges faced by organizations in adopting the CMMC fr...
Add Favorite
Automating Compliance and Security in a...
As technology advances and cyber threats evolve, agencies must strategically adapt their security posture. Attendees came together on January 11 to delve into HashiCorp's advanced automation techniques that can help your agency ensure robust IT security and compliance across platforms. Attendees gained insights into: Understanding the importance of compliance and security automation Exploring HashiCorp Vault, Boundary and Consul to create a Ze...
Add Favorite
DoDIIS Webinar Series:Transforming Geos...
Traditionally, geospatial analytics has been associated with GIS specialists and specialized systems. However, the landscape is evolving rapidly. With the increasing availability of third-party spatial data, such as satellite imagery, organizations are recognizing the importance of harnessing spatial analysis and incorporating it into their descriptive, predictive, and prescriptive workflows. In our modern, multifaceted world, geospatial data...
Add Favorite
Bridging the Cybersecurity Talent Gap i...
Navigating the unique challenges of the government and public sector demands a specialized approach to cybersecurity talent. This session will unveil groundbreaking methods, from upskilling your current team to leveraging a pre-vetted cybersecurity talent pool. We'll also explore government-funded cybersecurity training programs to enhance your workforce. Note: There is a way for your partners to also promote and sell bootcamps and talent, but...
Add Favorite
The Power of Unified Observability
Intelligent, real-time observability is helping today's leading government agencies and academic institutions streamline digital transformation. Dynatrace & Carahsoft hosted a webinar for attendees to learn how Dynatrace's unified, AI-powered observability platform can simplify cloud complexities and data proliferation across dynamic environments. Attendees of the on-demand webinar heard real-world success stories and practical examples of...
Add Favorite
Back to Search Begin New Search