Back to Search Begin New Search Save Search Auto-Notify
Taming the Data Dragon: Exploring the C...
Carahsoft & Exterro hosted a webinar on Tuesday, February 27th, 2024. With the continued rise of public records requests, data volumes have turned into a beast. Government agencies are facing a series of battles when it comes to FOIA requests, regulatory compliance, investigations, data deletion policies, and strict deadlines. To have a fighting chance, teams will need to know where data lives, who has access to it, and which regulations i...
Add Favorite
Unveiling Top Cloud Exploits and Cyber...
For more than 10 years, agencies have been shifting their digital footprint to cloud computing. The ability to rapidly scale solutions in a cost-effective manner allows any agency to enhance its agility, improve application release timelines, and leverage additional computing resources on demand. While this has changed how agencies manage their IT assets, the need for security remains just as strong. Throughout 2023, the Threat Research Unit a...
Add Favorite
Tungsten and 6e Technologies: Financial...
Download this webinar for an insightful session where industry leaders from Kofax and 6E Technologies unraveled the potential of intelligent automation in revolutionizing financial processes across the Federal Government. During this sessions, attendees learned: About Kofax and how Kofax can support Financial Process Automation across the Federal Government. About the platform components used in to support the AP and e-Invoicing needs Common p...
Add Favorite
Event Reporting in Smartsheet Gov
During this session, Smartsheet Senior Security Solutions Engineer, David Lewis, walked participants through what integration can look like with Event Reporting and how to set up the software for the policies being monitored. Participants learned the commands a government IT team can use to monitor for data exfiltration with Event Reporting in Smartsheet Gov and how Smartsheet Gov can help organizations get more awareness and visibility into h...
Add Favorite
Bridging the Largest Threat Visibility...
Attendees of this webinar learned: A better understanding of the email threat landscape Ways they can leverage threat intelligence in their maturing approaches to anticipating rather than merely reacting to the threats they face Register to view this on-demand recording.
Add Favorite
Future-Proofing Aerospace & Satellite C...
Amid a backdrop of escalating cyber threats within the aerospace & satellite (A&S) industry, and with federal agencies like the U.S. Space Force, NASA, and the Intelligence Community deepening ties within the supply chain, cybersecurity compliance has emerged as a linchpin for success. As the Space Force unveils its largest budget yet at $30 billion for FY24, the urgency for A&S vendors to align with federal cybersecurity standards...
Add Favorite
Creating a Virtual Learning Environment...
In the ever-evolving realm of virtual training, crafting an immersive and enduring learning experience necessitates a nuanced strategy coupled with the utilization of cutting-edge tools. As technology continues to reshape the way we engage with education and professional development, the significance of adapting to these changes becomes paramount. Watch our on-demand webinar where Erika Jacobs, a distinguished USMC Instructional Specialist, wi...
Add Favorite
Tableau 2024 Kick-off Webinar
This webinar gave attendees the opportunity to grow and enrich their data skills by connecting with their Tableau Team and fellow Tableau Users. Attendees were able to learn what’s new with Tableau and events to look forward to in the coming months. During this on-demand webinar, attendees were able to: Learn & grow - Discover the new features of Tableau 2023.3 and learn how those new features can take reporting to the next level Be...
Add Favorite
Future-Proofing Aerospace & Satellite C...
Amid a backdrop of escalating cyber threats within the aerospace & satellite (A&S) industry, and with federal agencies like the U.S. Space Force, NASA, and the Intelligence Community deepening ties within the supply chain, cybersecurity compliance has emerged as a linchpin for success. As the Space Force unveils its largest budget yet at $30 billion for FY24, the urgency for A&S vendors to align with federal cybersecurity standards...
Add Favorite
Adopting Least Privilege Principles to...
Endpoint security serves as the frontline defense in protecting your organization's network from a wide array of threats originating from devices that connect to the enterprise network, such as laptops, smartphones, and tablets. These endpoints are often the targets of cyberattacks as they provide access points to the organizational network, making them vulnerable to malware, ransomware, phishing, and other sophisticated attacks. By securing t...
Add Favorite
Back to Search Begin New Search