Establishing Boundaries in Today's Data...
Attendees of this on-demand webinar explored the intricacies of establishing and managing boundaries within data centers and IT infrastructure, which is crucial in the era of Zero Trust.
F5 Red Hat Tech on Tap
APIs are the lifeblood of the internet today. Everything from booking flights to reading your daily newsfeeds is all made possible by the growth of data sharing using Application Programming Interfaces (APIs). With the growth of modern applications, developers often unintentionally leak sensitive datasets. The proliferation of APIs has marked them as a prime target for malicious actors and nation-states leaving the DoD and the War Fighter vuln...
Solving Investigations with Social Media Data
With new data sources popping up every day, investigators need to constantly evolve to keep up with new data in their investigations. However, with the overwhelming amounts of new data, it's become increasingly difficult for investigators to sort through and link all the individual data points. Watch this on-demand webinar to learn from OSINT expert, Nico Dekens, who provides a detailed account of his experience using social media data and OSI...
Empowering Public Safety Agencies with...
Public safety agencies face the formidable challenge of efficiently analyzing and leveraging extensive volumes of data. With the ever-increasing complexity and quantity of information available, these agencies require a robust solution to effectively harness the potential of their data resources. This on-demand webinar explored how Tableau has emerged as an invaluable tool that equips public safety agencies with the capabilities to unlock hidd...
Introduction to Advanced Analytics with...
Join Alteryx for an interactive session on conducting end-to-end analysis. To start off, we will unpack how federal, state, and local agencies are utilizing data driven approaches to enhance their operations, including reconciliation, risk assessment, and data deduplication. After a brief introduction to the possibilities, you'll go hands-on and learn how to apply these techniques for yourself. You will learn how to bring in and merge differe...
DevSecOps: A Shift Left for Security an...
The success of federal agencies hinges on modernization. As such, a growing number of government programs are adopting DevSecOps methodologies but struggle to harness its full potential. With Atlassian's Jira Software and Confluence, agencies can make the most of their adoption by streamlining workflows and boosting agility. Join Atlassian experts on November 15th to explore: Use cases on federal agencies modernizing their systems using A...
Leveraging Delinea Server PAM for Smart...
Smart cards provide an enhanced level of security for Linux computers when users log on to Active Directory domains. If you use a smart card to log on, authentication requires a valid and trusted root certificate or intermediate root certificate that can be validated by a known and trusted certification authority (CA). Because smart cards rely on a public-private key infrastructure (PKI) to sign and encrypt certificates and validate that the c...
Building an AI-Ready Lakehouse From Sta...
In a world where generative AI delivers new possibilities for transformational results, organizations often overlook the important role data pipelines and platforms play in training, retraining, deploying, and hosting the right ML models to generate powerful AI results. Join Mike Gualtieri, VP & Principal Analyst at Forrester Research, and experts from Cloudera and Intel, for an in-depth discussion on the unique capabilities of a modern op...
Shifting from Service-Centric to Person...
In the realm of government leadership, the transition from a service-centric to a person-centric approach is not just a trend but a necessity. As government leaders, you play a pivotal role in shaping the future of local agencies and our communities. Join us for a complimentary webinar designed specifically for government leaders to delve into the transformative power of adopting a person-centric approach in the age of AI. Discover how this pa...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.