Embrace the Power of NinjaOne
IT leaders in state and local governments face unique challenges in supporting diverse agencies efficiently. By choosing and leveraging the right tools effectively, they can streamline endpoint management, reduce costs, improve services, and free up time for strategic IT projects, enhancing overall operational efficiency. NinjaOne is the leading unified IT management platform that simplifies IT workflows thanks to powerful automation capabili...
Illuminating the Darknet for Government...
Thank you for your interest in this event. Attendees of this on-demand webinar learned how the darknet can be used to: Track illicit sales of drugs, human trafficking, and cyber weapons Detect potential threats and monitor persons of interest Stay one step ahead of foreign Nation-State adversarial activity and attacks Learn the latest tactics, techniques, and procedures of threat actors to better prevent future cyberattacks on critical infrast...
JADC2 Intelligent Automation Exoskeleto...
This on-demand webinar explored the innovative integration of UiPath’s cutting-edge automation and AI capabilities to create an 'Automation Exoskeleton' for intelligence analysis. These solutions are designed to augment and enhance the efficiency of intelligence analysts in processing and interpreting vast and complex datasets and reducing the pain of the intelligence-publication process. With this technology, the speed and accuracy of t...
Enhancing Federal Operations: Harnessin...
This session uncovered the transformative potential of integrating General Artificial Intelligence (GenAI) with ServiceNow's advanced capabilities, strategically designed to optimize U.S. Federal Government operations. Attendees investigated how ServiceNow's Now Assist, can elevate through the synergy with GenAI, resulting in streamlined routine tasks, content creations and optimized resource allocation. They also explored how this dynamic col...
Embracing A Data-Driven Approach To Cyb...
Understanding what devices exist in your environment is the foundation to security. Identify compliance gaps and risks for all IP connected assets regardless of if they are managed or unmanaged. Where are you today with your Asset Management mission? Allow Armis to provide you real-time visibility and control over every asset connected to your network. The overview of the platform focused on: Discovering and managing an accurate, unified and...
Data-Driven Solutions for Substance Use...
Inappropriate opioid prescribing has fueled one of the deadliest drug epidemics in US history. Though most opioid-related overdoses involve prescription opioids, an increasing number is linked to illicit opioids such as heroin and fentanyl. Download this on-demand webinar to learn how Egen and Salesforce’s cloud-based solution enables cross-agency data-sharing initiatives to: Generate insights about contributing factors to the opioid epi...
Exploring Software Risk Management for...
Securing sensitive data and critical systems is crucial. Software risk management and application security strategies identify and mitigate vulnerabilities, ensuring compliance with industry standards for enhanced public sector cybersecurity. Synopsys experts taught attendees to understand how Application Security Posture Management (ASPM) and Software Risk Management (SRM) can help your organization more effectively comply with software secur...
The AI Revolution – Transforming Email...
As cyber threats become more frequent and sophisticated, the adoption of Artificial Intelligence (AI) is reshaping the landscape of email security. This webinar will delve into key aspects of the AI revolution and its pivotal role in protecting against highly sophisticated attacks. Attendees joined Mimecast and Carahsoft to learn: What AI is and What It's Not Benefits of Deploying AI in Cybersecurity Tools Challenges in AI-Powered Threat Detec...
2023-2024 Annual SLED Cybersecurity Pro...
Attendees joined us to dive into cybersecurity trends in SLED, their implications, and opportunities for their organization. They heard from SLED IT leaders and experts to learn about approaches to the benefits and challenges of implementing a Whole of State cybersecurity program, strategies and best practices for retaining and developing cyber talent, different methodologies around how SLED leaders are budgeting for cyber insurance, and techn...
2024: FAR Part 5, Publicizing Contract...
Join Washington DC based, Jennifer Schaus & Associates in the 2024 Webinar Series covering The FAR, Federal Acquisition Regulations. This series features guest speakers who will uncover the important details and nuances of The FAR. Get educated about the rules and regulations in the game of federal contracting. This series is COMPLIMENTARY & RECORDED. Recordings are posted on our YouTube Channel. CORPORATE SPONSORSHIPS of this Webinar...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.