Modernizing Investigative Case Manageme...
Attendees joined ServiceNow for a Federal ServiceNow workshop focused on modernizing investigative case management. This interactive session delved into how ServiceNow Public Sector Digital Services (PSDS), powered by Now Assist AI and Automation, can revolutionize federal investigative case management - enhancing service delivery, streamlining operations, and creating more visibility through data analytics. Attendees learned how ServiceNow he...
Strengthening Your Security with Active...
Even the most robust identity governance solutions miss out on the foundational needs of highly secure directory management tasks. By leveraging intelligence already available in your directory, you can improve the security profile of your organization with easy-to-use practical solutions. Attendees joined Netwrix on Wednesday, July 17th, to learn how to discover areas of weaknesses and strategies to address these hidden dangers proactively. A...
F5 BIG-IP Next - Explore the Next Gener...
Attendees joined F5 and Government Acquisitions at the Celeste Hotel on Wednesday, July 17th for a hands-on lab featuring BIG-IP Next.All BIG-IP users were invited to this personalized training on BIG-IP Next, F5’s Next Generation Platform. During the session, attendees received a first look at the BIG-IP Next platform while going through application deployment exercises to address load balancing, application security, and app access use...
Revolutionizing Federal Data Management...
During the webinar, attendees:Explored GEN3i Services' expertise in facilitating secure data migrations from legacy systems to modern platforms, enhancing data accessibility and reliability.Understood the significance of Cohesity achieving FedRAMP Moderate Authorization and how this ensured compliance with stringent federal security standards.Learned how to leverage Cohesity’s AI and ML-based ransomware detection and Zero Trust security...
Navigating Modern Data Protection ...
In today's modern landscape, there is a growing need for robust data loss prevention (DLP) solutions to protect sensitive data and ensure compliance with data privacy regulations. In this webinar, Symantec takes an in-depth look at the evolving cybersecurity threats to organizational data and actionable data protection strategies.Attendees learned:The challenges educational organizations are facing and the importance of applying data protectio...
Defending Against the Quantum Threat: F...
The day a cryptographically-relevant quantum computer (QRQC) with enough power to break modern encryption is coming and world governments are taking action and advising agencies and commercial entities to start taking action now. Although these powerful quantum computers won't exist for another 5 to 15 years, attackers are already taking advantage of the opportunity to steal valuable secrets through harvesting attacks - where a copy of the dat...
Navigating the AI Data Governance Landscape
High use of content creation poses a significant impact on records and compliance obligations. In this webinar, we learned key elements to manage data using AI. We also took into account ethical considerations, addressed how to properly navigate regulatory compliance hurdles, and presented actionable strategies for success.Specifically, we discussed:Balancing AI use against the riskResponsible AI frameworksNIST AI risk management modelReal wor...
Election Integrity in the Digital Age:...
Do you have too many Security Analysts and Engineers sitting around with nothing to do? We didn't think so; you are not alone. You may have heard how security automation can elevate your team and help move you from playing defense and reacting to incoming threats. Go on the offensive, get empowered, and get in control of your security operations to achieve your strategic goals. Splunk’s Security Orchestration, Automation, and Response (S...
Joint All-Domain Command and Control (J...
JADC2 Strategy provides a vision of a connected battlefield, improving joint force command and control capabilities. Knowledge is power, and a connected environment provides greater insight from increased sensors on the ground, sea, air, and space. But what happens when communication becomes less than perfect? Can JADC2 continue to operate with Denied, Disrupted, Intermittent, and Limited (DDIL) communications? This presentation by HPE ...
The State of Secure Identity: The Lates...
The log-in box is both the gateway and guardian to your customer facing applications and a prime target for threat actors looking to profit from account takeovers. As these cybercriminals utilize AI to get past the log-in box, protecting your applications also requires sophisticated AI-based layered defenses. Okta’s State of Secure Identity Webinar gave attendees insight into this evolving threat landscape and how you can best defend you...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.