Connecting the Unexpected: Scalable Dat...
Thank you for your interest in our Certus Group webinar! During this webinar, attendees learned: How Knowledge Graphs provide a scalable solution for your data structure needs The application of large language models to knowledge graph solutions The diverse use cases supported by Certus Core’s Semantic Knowledge Graph solution The importance of data governance and data standardization in scalability
Reduce Risk, Enhance Response: Ransomwa...
Every year, ransomware continues to be a persistent and evolving threat in the realm of cybersecurity. As technology advances, ransomware adapts, making it essential for state and local government to stay vigilant and implement robust security measures. The impacts of ransomware extend beyond financial losses, encompassing data breaches, reputational damage, and operational disruptions. Defending your agency against these threats requires proa...
The Future of Work for Government Agencies
Many federal, state, and local government entities are struggling to find the right strategy of hybrid work and where employees want to work with an abundance of unused or underutilized office space. For those agencies with large real estate portfolios, this balance can be further exacerbated by a lack of understanding of how the space is used across buildings, cities, and states. This begs the question: where will hybrid work go next? FM:Syst...
2024: FAR Part 31, Contract Cost Princi...
Join Washington DC based, Jennifer Schaus & Associates in the 2024 Webinar Series covering The FAR, Federal Acquisition Regulations. This series features guest speakers who will uncover the important details and nuances of The FAR. Get educated about the rules and regulations in the game of federal contracting. This series is COMPLIMENTARY & RECORDED. Recordings are posted on our YouTube Channel. CORPORATE SPONSORSHIPS of this Webinar...
The Intent to Compromise: Bypassing Fir...
Today’s technology professional needs a detection system that not only blocks any indicator if their site is compromised, but also one that blocks access to malware downloads, and prevents phishing attacks. What if your system could also identify threats while in the planning stage? This is the zone where lookalike detection comes in, and it can proactively prevent attacks before they are even launched. This webinar taught how threat hun...
Securing Tomorrow: The Role of CTFs in...
Attendees of this webinar explored how Capture the Flag (CTF) events serve as a dynamic platform for fostering cybersecurity talent within universities and state/local government agencies.
AWS Georgia Public Sector Innovation Day
AWS experts are returning to Atlanta! AWS subject matter experts will discuss AWS solutions and how they can help you unleash the powers of digital transformation without disruption by harnessing the proper tools to help your agency thrive. Topics will include organizational intelligence, generative AI, modernization, security, and more.
Enhancing Unemployment Insurance Integr...
This webinar covered key aspects of Mastercard's approach to fraud prevention, including: Enhancing the accuracy of identity verification processes. Ensuring seamless access to unemployment benefits for legitimate workers. Utilizing existing data to assess the riskiness of claims more effectively. Streamlining the process to fund legitimate claims quickly. Achieving the ideal balance between security measures and accessibility for users.
Splunk Workshop Series
Participants joined us for a workshop series designed to enhance Splunk skill sets across their organization! Our five-part virtual workshop series covered fundamental basics, machine learning, observability, dashboard studio, and investigating fraud. Led by industry experts, these hands-on workshops empowered teams to unlock the full potential of Splunk!
Defend, Protect, Educate: Revolutionizi...
Thank you for your interest in our Conceal webinar: Defend, Protect, Educate: Revolutionizing Browser Security for Educational Institutions and Students Webinar Highlights: Understand the rising threat landscape and the risks posed by cyberattacks on educational institutions Learn how ConcealBrowse addresses browser-based threats, combats click rates and neutralizes evolving phishing tactics Explore ConcealBrowse’s role in addressing per...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.