Harnessing Collective Knowledge: AI Sol...
Student data threats are on the rise, yet many higher education institutions are stuck with outdated, manual identity verification processes. These legacy systems not only open the door to security risks, but also burden staff and frustrate students. With growing concerns around fraud and managing "ghost students," it's time for a smarter approach to campus security. Join the Center for Digital Education and Socure for a one-hour webinar that...
Getting Educated in Gen AI: Future Tren...
The use of generative AI in K-12 education is gaining momentum, from personalized learning tools to new operational efficiencies. But with this innovation comes a host of new questions about security, privacy, and how to responsibly integrate these technologies into the classroom. Join the Center for Digital Education for an in-depth discussion featuring Kris Hagel, Chief Information Officer of Peninsula School District, along with technology...
Safeguarding Program Integrity: Lessons...
In today's complex data environment, protecting program integrity is more important than ever. Whether it's fraudulent unemployment claims, improper tax filings, or other forms of financial crime, government agencies are under increasing pressure to detect and respond swiftly to threats. But how do you turn overwhelming amounts of data into actionable insights that protect the integrity of your programs? Join Government Technology and Splunk f...
Ready Your Data for AI
The urgent need for AI-ready data is creating new demands on D&A leaders. AI-ready data is contextual to the AI use case and technique, necessitating the evolution of data management practices. D&A leaders must prove data readiness and adapt their practices to meet new business expectations. However, there is a great deal of confusion around generative AI (GenAI). Its value today is dependent upon working with enterprise data and appli...
November 18, 2024
Organizer:
Gartner Location:
Webcast
Transforming Government Customer Servic...
The Executive Order directing federal agencies to improve customer experiences (CX) and service delivery, issued in December 2021, directs agencies that, “Government must be held accountable for designing and delivering services with a focus on the actual experience of the people whom it is meant to serve. Government must also work to deliver services more equitably and effectively, especially for those who have been historically underse...
November 18, 2024
Organizer:
FedInsider Location:
Webcast
Zero Trust Architecture (NIST SP 800-207)
In this CPE training event, we overview the principles and implementation of Zero Trust Architecture to enhance your organization's security posture. Zero Trust Architecture, based on the NIST SP 800-207 criteria, revolutionizes the traditional approach to cybersecurity. It challenges the assumption of implicit trust within networks and promotes a model where trust is never granted by default. Instead, it emphasizes continuous analysis and ev...
CMMC Level 2 Implementation
The CPE training event is designed to provide participants with the knowledge and skills necessary to implement the Level 2 practices based on 48 CFR 52.204-21. These practices establish a crucial security foundation for organizations aiming to achieve higher levels of cybersecurity maturity within the CMMC model. It is mandatory for all certified organizations to complete the Level 2 practices. This event should be attended as the CMMC progra...
Women in AFCEA Virtual Happy Hour: Nove...
Join Women in AFCEA for our popular virtual happy hour! Switch off from work, grab a drink, and join your fellow women professionals for a positive chat about life in the IT/Cyber/Global Security industry. We'll be sharing our 30 second elevator pitches or back of a napkin business plans and holding a working session on how to optimize these quick pitches to ensure you're being effective.
Increase Your Speed and Agility with IT...
Join us for an insightful webinar designed to help you increase your speed and agility in navigating the International Traffic in Arms Regulations (ITAR) through the strategic use of exemptions. This session will provide participants with practical strategies and expert guidance to streamline compliance processes, accelerate approvals, and enhance operational efficiency while staying fully compliant with ITAR requirements. In this special one-...
Dynatrace Lunch Bytes Webinar Series
Instead of settling for a regular break, participants are joining Dynatrace online for Lunch Bytes, a snackable series of easily digestible events covering today's leading technology topics. Attend to upgrade your lunch time with Public Sector Solutions Engineer, Matt Gardner, as he shares tactical insights and practical use cases on the following topics across three 30-minute sessions.CI/CD Secrets: Dynatrace & Red Hat OpenShiftEnhance th...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.