CTO Sessions: Cloud HSM Best Practices
Although federal agencies are deploying cloud solutions at a rapid pace, they are often hesitant to move their core cryptographic infrastructure to the cloud—namely their roots of trust. Hardware security modules (HSMs) are used as a root of trust and generate, store, protect, and manage cryptographic keys used to secure sensitive data and critical applications. HSMs are traditionally deployed on-premises but they can be safely deployed...
Safeguarding State, Local and National...
In today’s landscape of increasingly sophisticated cyber threats, safeguarding state, local and national security is more crucial than ever. Proofpoint and Carahsoft are thrilled you attended our webinar. We explored how the Cybersecurity Maturity Model Certification (CMMC) can enhance your security posture and how Proofpoint’s state-of-the-art impersonation protection can be a key component in this effort.Thank you for joining us...
Increase Self Service with Data to Driv...
In this webinar, attendees learned about:Challenges Indian tribes face as they seek to modernize systems and operationsHow organizations are using modern cloud analytics to monitor the health of Tribal departments and make data driven decisions in key areasHow data from multiple systems can come together in central data models that facilitate cross functional visibilityHow Qlik can take data end to end to provide value to Tribal membership man...
It's Time to Modernize Your Org Charts
Attendees learned how to embrace the future with Ingentis org.manager and they discovered the transformative power of automation. Ingentis org.manager provides a comprehensive solution for organizational design and people analytics.During this webinar, attendees learned about: Outdated drawing tools: ineffective for future-oriented organizationsUp-to-date charts without manual effortsUnlocking organizational insights with versatile chart creat...
TDTM: Enhancing Federal Data Security:...
This webinar was designed for federal IT professionals seeking to move beyond conventional backup solutions and adopt comprehensive cyber resilience frameworks. Our experts covered topics such as immutable data, AI-driven threat detection, and rapid, secure recovery processes.Attendees learned about:Insights into the limitations of traditional backup methods.Techniques for integrating cybersecurity with data protection.Strategies for implement...
Ask Us Anything: VMware by Broadcom Army ELA
Attendees joined us for our Ask Us Anything: VMware Army ELA webcast where they heard from Department of Defense IT expert and VMware Army Program Director John Jordan on how you can best leverage VMware technology in this contract.During this webcast, attendees learned about:The full scope of VMware technologies available to you in this new ELAA variety of army-specific IT trainings you and your team can attend to upgrade your mission-critica...
Salesforce Lunch and Learn for Los Ange...
Learn how LA County agencies are leveraging Salesforce to manage data, collaborate, and streamline workflows. County department representatives shared their Salesforce journeys and practical applications during our informative webinar.Here's what you missed:Combining Tableau's strength in data visualization with Salesforce's CRM expertiseActionable tips on optimizing data management and reportingProven strategies to enhance collaboration acros...
How Agencies are Solving More Crypto Cr...
As the crypto landscape grows increasingly more complex, law enforcement, civilian, defense, and tax agencies alike need intelligence they can trust to help mitigate and stay ahead of illicit activity on the blockchain. But choosing the right intelligence platform can be a high-stakes, mission-critical decision—particularly for the security and technology leaders at the helm of these organizations. So what really matters when it comes to...
Security-Driven Networking
Discover the power of the Fortinet Fabric architecture for Secure Networking. Fortinet is the only secure-networking vendor that has a single operating system for firewall, switches, APs, and Network Access Control. Fortinet users get the most comprehensive visibility, fastest time to discover breaches, lowest management overhead, and the lowest TCO. During this complimentary demo desk, attendees learned:Why it is best to best to build a netwo...
UiPath Test Suite Webinar
Complying with stringent regulatory requirements, properly masking citizen data, operating with limited resources and budget—these are just a few of the challenges that organizations in the public sector must overcome when testing applications. With UiPath Test Suite, you're equipped with production-grade, AI-powered test automation capabilities that enable you to test all your applications—both modern and legacy—so that you...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.