Back to Search Begin New Search Save Search Auto-Notify
Kofax and InfoCap: Intelligent Process...
Government and Commercial organizations are burdened with multiple-data and documentation sources. InfoCap leverages the disciplines and technologies of data and document centric business processes into an Intelligent Process Automation platform (IPA) for business process automation, omni-channel document capture, and robotic-process automation leveraging Kofax Total Agility (KTA) software. InfoCap delivers innovative digital workforce solutio...
Add Favorite
Harness Data & Artificial Intelligence...
At the recent webinar with BJSS, AWS & Carahsoft, attendees learned from our experts about their greatest challenges and success stories with using AI to transform their public services, Attendees of this on-demand webinar learned: Strategies to harness data and AI, transforming citizen experiences and reducing access barriers. How to overcome digital transformation obstacles and discuss success definitions, data privacy, security and crea...
Add Favorite
DoD Modernization Through Automation: L...
Attendees learnded how to harness the power of Red Hat automation and Linux technologies to drive modernization efforts within the U.S. Army Corps of Engineers (USACE). These powerful tools can not only automate routine tasks but also enforce the security standards mandated by the Defense Information Systems Agency (DISA). This hands-on on-demand training provided the ability to enhance security posture while streamlining operational processes...
Add Favorite
Demo: Tenable Operational Technology Security
This on-demand demo showcased how Tenable OT Security delivers complete visibility into an organization’s converged IT/OT infrastructure to help maximize the safety and security of your OT environment. Our Tenable OT Demo covered the following: Comprehensive visibility across converged IT/OT operations. Risk reduction through multiple threat detection methodologies. IT and OT asset identification and monitoring with Tenable OT Security....
Add Favorite
Preparing for Cybersecurity in an AI-Ru...
During this on-demand webinar, we discussed: What all the AI chatter really means - what's possible, what's not, and who should care Whether AI poses an existential cybersecurity threat and how to protect against it How to use today's AI effectively and responsibly - and how to plan for what's next
Add Favorite
Automating Governance, Risk, and Compliance
Attendees of this on-demand webinar learned GRC strategies including: NIST, CMMC, and BOD Lifecycle Management Automating Cybersecurity Risk Management and Compliance Modernizing Risk Assessments Managing technology assets in your agency
Add Favorite
Cortex XDR Coffee Talk: Brewing Up the...
Attendees of this on-demand webinar better understand how Cortex XDR allows for: Full visibility across network, Cortex endpoint, cloud, third party and identity sources, not just endpoint Reduced mean time to detect (MTTD) and mean time to respond (MTTR) Out-of-the-box identity-focused threat detection for initial access tactics, techniques, and procedures (TTPs) and available add-ons for advanced identity-based threat detection analytics, l...
Add Favorite
From NIST to OMB: Better Manage a Compl...
The Compliance Essentials for Splunk (CES) app can assist your organization by continually monitoring your compliance posture across various control frameworks like NIST Risk Management and OMB M-21-31. The Splunk CES app gives you a way to quickly and easily visualize your compliance posture in a collection of easy to read dashboards, with searches running in near real time to ensure your organization conforms with the selected control family...
Add Favorite
Optimizing Cyber Insurance: The Importa...
The cyber insurance landscape is evolving rapidly, driven by a surge in claims, particularly within the education sector. Active adversaries specializing in ransomware attacks are increasingly targeting educational institutions. In fact, in the U.S., 56% of K-12 and 68% of Higher Ed experienced significant impacts from ransomware in the last year. Even though most institutions already have some cyber insurance, they're discovering that the cyb...
Add Favorite
Cybersecurity for Industrial Control Sy...
In this on-demand webinar, attendees learned about: Comprehensive threat detection to identify potential risks promptly Proactive attack prevention to physically block cyber attacks before they can compromise your critical infrastructure Enhancing overall operational efficiency while building resilience against cyber threats
Add Favorite
Back to Search Begin New Search