Back to Search Begin New Search Save Search Auto-Notify
Maximize Your Dollars with the FCC Cybe...
Securing Your School with Cybersecurity Pilot Program Funding Attendees discovered how to secure their school with the E-Rate dollars and take advantage of the Federal Communications Commission’s (FCC) new Cybersecurity Pilot Program. This webinar provided insights into leveraging these resources to enhance your school's security infrastructure. Learn about the specifics of the Cybersecurity Pilot Program, which offers additional financi...
Add Favorite
Securing CAD Designs for Defense Contra...
Watch this on-demand webinar hosted by Secude, Gold Comet, and Carahsoft. This session, titled Securing CAD Designs for Defense Contracts: What You Need to Know, is tailored for government contacts like yourself who are involved in the defense industrial base. In today’s defense sector, CAD files are the backbone of critical design projects, making their security paramount. This webinar will dive into the specific cybersecurity challenge...
Add Favorite
Optimize Your Water Infrastructure: Wha...
Are you still using cumbersome spreadsheets for hydraulic modeling and struggling to get the insights you need? Bentley’s OpenFlows solutions offer advanced water, wastewater, and stormwater modeling tools designed to help you efficiently analyze, design, and optimize your water networks.Watch our on-demand webinar with Joel Johnson, Director of Product Management at Bentley Systems, and Simon Newton, Application Engineer at Bentley Syst...
Add Favorite
Unleash Team Potential: Strategies for...
Without the ability to track and view agency-wide work, workflows become bogged down with manual tasks. Modern workflows need tools capable of scaling and automating frequent processes. On October 17th, attendees discovered strategies to elevate their team's performance. Topics included:Actionable insights into optimizing project managementInnovative practices that are easy to implementMethodologies to transform organizational operations
Add Favorite
Rhode Island Government Tableau Cloud ...
This was the first of many upcoming Tableau education sessions designed for all levels of government employees—from analysts to executives—and provided valuable insights for business, data, and analytics leaders, as well as other technical roles. Attendees discovered how to leverage Tableau Cloud and AI for personalized, contextual data insights. Whether they were new to Tableau, experts, or looking to harness AI-powered insights,...
Add Favorite
Foundation to Security: Verifying Compo...
In today’s rapidly evolving digital landscape, the security of your IT infrastructure and endpoint devices begins long before systems reach your facility—starting with the integrity of the supply chain. From the moment components are assembled into systems, maintaining traceability and transparency is critical to ensuring that your agency operates with trusted computing systems. This webinar covered the following topics:The essenti...
Add Favorite
Transforming Citizen Service: How Publi...
Our Citizen Request Management solution, built on the Salesforce platform, is specifically designed to address the challenges faced by modern Citizen Request Agencies. This solution is not only user-friendly and flexible but also highly adaptable, allowing it to meet the evolving demands of public service. Most importantly, it is a turnkey solution, ready to deploy with minimal configuration or customization required. During this webinar, atte...
Add Favorite
Stay Compliant with the CJIS Security Policy
The FBI Criminal Justice Information Services (CJIS) Security Policy sets the baseline security standards that both criminal justice and noncriminal justice agencies must adhere to in order to access and safeguard criminal justice information. The clock is ticking to meet these CJIS compliance standards! Failing to comply can lead to serious consequences, including legal penalties, data loss, and reputational damage.CyberArk, the global leader...
Add Favorite
Autonomous Pentesting In-House: A Game...
Attendees joined us to learn how Horizon3.ai software (NodeZero) is changing the paradigm of annual pentesting and vulnerability scanning into a truly manageable, exploitability focused model. Enabling cybersecurity teams in leading higher education to answer the most fundamental question in cyber on a consistent basis; Are we secure today? Have we addressed our most critical security weaknesses before they can be exploited by attackers; as ph...
Add Favorite
XD Vision: The Future of Multi-Domain A...
Attendees joined this webinar for an exclusive unveiling of XD Vision, the next-generation cross domain solution (CDS) from Owl Cyber Defense. Soon to be certified and approved for deployment, XD Vision is the world’s first and only CDS designed for secure, multi-domain audio (VoIP) and video (VTC & FMV) collaboration. XD Vision combines RTB-compliant security with an elegant, user-friendly interface, empowering operators and command...
Add Favorite
Back to Search Begin New Search