AI-Enhanced Inspections & Work Order Au...
This webinar delved into the invaluable lessons learned and the powerful capabilities unlocked through this venture and implementing it for the state government. We will discuss how AI and Salesforce are redefining efficiency in government operations, particularly in the realms of case management and resource allocation. Key Takeaways: Image Recognition: Confirming descriptions and providing additional details. Data Management: Enhancing clean...
Microsoft Office Offensive Tradecraft
View this webinar to learn more about: Recent developments such as Mark-of-the-Web Microsoft security controls including trust settings and decision flows Tactics for gaining initial access, lateral movement, and long-term persistence
Enforce Least Privilege Across Every Endpoint
Almost every cyberattack today involves the exploitation of privileges. Broad privileges and entitlements greatly expand the attack surface and leave your organization extremely vulnerable to security breaches. However, a least-privilege access approach requires that users and programs receive the least amount of permission when required to complete specific tasks. Least privilege is one of the most essential security measures for organization...
Modernizing Security: Simplifying Zero...
Government security teams today are under constant siege. Not only are they responsible for defending their organizations, but they are also tasked with complying with new and in-depth mandates that span Zero Trust, logging and most recently, artificial intelligence (AI). Leading agencies such as Oak Ridge National Laboratory are at the forefront of security innovation modernization. They achieve this by embracing next-generation solutions tha...
2024: FAR Part 35, Research and Develop...
Join Washington DC based, Jennifer Schaus & Associates in the 2024 Webinar Series covering The FAR, Federal Acquisition Regulations. This series features guest speakers who will uncover the important details and nuances of The FAR. Get educated about the rules and regulations in the game of federal contracting. This series is COMPLIMENTARY & RECORDED. Recordings are posted on our YouTube Channel. CORPORATE SPONSORSHIPS of this Webinar...
Protecting Your Agency's Data in the Di...
Whether you're a seasoned database administrator or new to SAP ASE, SAP IQ, and SAP ASPE, this webinar provided valueable insights applicable to all levels of expertise. In this webinar, attendees: Gained insights into the security features in SAP ASE, SAP IQ, and ASPE Discovered products, proven strategies, and techniques that enhanced attendees security posture Engaged with Wayne Waldrup our seasoned database expert during our Q&A sessio...
Charting Paths Forward: A Recap of Tabl...
This was an enlightening webinar that reflected on the insights gathered from our comprehensive 5-Part Public Safety Series and explore the evolving landscape of data analytics and AI in the public safety sector. During this webinar, attendees were able to: Delve into the key takeaways and success stories shared by presenters from each of the five webinars, featuring representatives from DetrDetroit Police Department, MN Bureau of Criminal App...
Tungsten Automation and Optima Webinar
Download this Tungsten Automation and Transcend AP webinar for a hands-on session that is specifically designed for higher education institutions. Attendees delved into how automating your AP workflow can unlock significant benefits such as: Cognitive Capture (AI & ML) of Invoices: Say goodbye to manual data entry! Attendees learned how Tungsten Auomation and Transcend AP our intelligent technology automatically extracts and categorizes in...
Navigating Regulatory Frameworks for Ex...
In an era where digital transformation is integral to how we do business, the significance of adhering to compliance frameworks and mitigating associated risks cannot be overstated. Organizations face the dual challenge of ensuring they are resilient against threats while also remaining compliant with an evolving landscape of regulatory requirements. Attendees joined for a strategic session that delves into the essentials of the Risk Managemen...
Integrating SBOM and Vulnerability Resp...
The visibility that a Software Bill of Materials (SBOM) gives into the ingredients that make up software components is critical to understanding cybersecurity risks. But understanding is only part of the solution. Organizations need to be ready to act on vulnerabilities before they impact system security. Attendees joined ServiceNow to examine the synergies between ServiceNow's Vulnerability Response framework and the principles underpinning C...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.