Back to Search Begin New Search Save Search Auto-Notify
Build a Modern Identity Infrastructure:...
View this on-demand session, Chad Peterson, Senior Sales Engineer at Okta, as he discussed how to retire costly legacy infrastructure and complex code development by modernizing your agency's IT platform with a modern identity infrastructure.
Add Favorite
Nuance Dragon Medical Webinar
Federal agencies employ clinicians responsible to document the patient narrative in the medical record with a high degree of completeness, specificity, and accuracy. Unfortunately, many clinical end users are experiencing burnout and long to spend more time with patients instead of the computer, and create a margin for work-life balance. Medical speech recognition technology addresses those challenges but has not been secure enough to meet rig...
Add Favorite
Adobe Connect Webinar Series: Create Cu...
Adobe Connect's unique ecosystem of persistent services, including HTML5 Pods, enable extensibility of data, graphic, and system views. With the release of Adobe Connect 11, it is easier than ever to create your very own custom pods. Watch our 4-part Adobe Connect webinar series to improve your Adobe Connect room's functionality and engagement levels. Listen to Adobe experts as they walk through the creation and implementation of user-created...
Add Favorite
Unit 42 by Palo Alto Networks
Unit 42 brings together world-renowned threat researchers with an elite team of security consultants to create an intelligence-driven, response-ready organization. As threats escalate, Unit 42 is available to advise federal agencies on the latest risks, assess their readiness and help them recover when the worst occurs. Whether responding to a breach or managing cyber risk, Palo Alto Networks understands your challenges. Hailing from US govern...
Add Favorite
Cyber Threats & Lessons Learned from 20...
View this on-demand webinar to review some of the most impactful hacks from 2021 and the key takeaways for protecting critical data and infrastructure as we enter into the new year of 2022. Topics discussed include: A review of some of the most effective hacks of 2021 such as the Colonial Pipeline ransomware incident, SolarWinds supply chain attack, Microsoft Exchange hack, NSO Group Apple iOS hack with Pegasus, and more. Why an understanding...
Add Favorite
Protect Your Agency's Data with Rubrik...
View this on-demand webinar discover how Rubrik and Clearshark can defend your agency's data against cyber attacks. Experts from Rubrik and Clearshark discuss how Rubrik's unique immutability and zero trust architecture, integrated with Clearshark's innovative solutions, instills confidence that your organization's data can be quickly and accurately recovered. Our featured speakers dive into the industry- changing Rubrik and Clearshark integr...
Add Favorite
Delivering Secure and Personalized Stud...
Today's academic institutions are under increasing pressure to use the latest technologies to attract and retain students. Online learning is a way of life now and for the next generation. Meanwhile, faculty and staff also need to work safely and securely from any location. Across the board, users have higher expectations about their consumer technology experiences. Watch this on-demand webcast to learn how your institution can: Deliver excep...
Add Favorite
F5 & NGINX Kubernetes Ingress Controller
As government and education organizations continue to embrace modern application development processes, we are seeing an increased demand for NGINX expertise and experience in new job openings. View this on-demand recording focused on helping organizations leverage NGINX solutions to position and effectively support the industry shift towards modern application development processes (containers, Kubernetes, micro-services, DevOps, and DevSecO...
Add Favorite
Implementing a Digital Mailroom
Technology advancements, like Artificial Intelligence (AI), are enabling state agencies to automate like never before. Challenges such as augmenting human review of incoming documents, handling the transition to REAL ID, and preventing fraud must be considered when deciding which technologies to utilize. This on-demand webinar series ensures that you are aware of the latest options to tackle your agency's document demand. View this on-demand w...
Add Favorite
DNS Security Data Exfiltration Workshop
View our on-demand recording enablement security workshop. In June 2020, the NSA Cybersecurity Director said that securing DNS can stop 92% of malware attacks on a network. Next-gen firewalls and endpoint tools have left behind DNS-based security blind spots. This workshop will walk system engineers through the conceptual abstracts of DNS security and bring a hands-on demonstration to enable attendees to test a network for DNS security gaps....
Add Favorite
Back to Search Begin New Search