Beyond Traditional Boundaries: Moderniz...
While the Personal Identity Verification (PIV) and Common Access Card (CAC) represent a high assurance, technically interoperable, and a highly regulated method of authentication, they suffer from factors such as ease of use, ability to work with mobile devices and across devices. Office of Management and Budget (OMB) memorandum M-19-17, Enabling Mission Delivery Through Improved Identity, Credential, and Access Management, opened the door for...
July 11, 2024
Organizer:
ATARC Location:
Webcast
Run Your IT Like an F1 Team
What does running IT have in common with Formula 1? You have to balance speed and performance with safety. Join our upcoming webinar to hear how Dan Keyworth, Director of Business Technology Department at McLaren Racing, is using the Alteryx AI Platform to drive analytics and AI innovation to keep the McLaren car at the front of the race — while maintaining the security and reliability to manage risk. During this webinar, we’ll dis...
July 11, 2024
Organizer:
Alteryx Location:
Webcast
Implement AI and Generative AI While Mi...
Artificial intelligence, perhaps especially generative AI (GenAI), will dramatically transform every industry in both the public and private sectors. That transformation carries risks for every organization, some common across industries and others more unique to particular sectors. Join this complimentary Gartner AI webinar as a panel of Gartner cross-industry experts looks at the risks your organization could face as you deploy AI and GenAI....
July 11, 2024
Organizer:
Gartner Location:
Webcast
From No to Yes: Getting Finance to Gree...
B2B tech purchases are experiencing heightened scrutiny from prospective buyers’ finance leaders. Tech and service providers need to figure out how to effectively manage finance’s influence on the buying committee. In this complimentary Gartner webinar for product leaders, a Gartner expert explores the impact of finance on cross-functional buying teams, differentiators that matter to finance stakeholders, and strategies for engagin...
July 11, 2024
Organizer:
Gartner Location:
Webcast
MSSP Virtual Cybersecurity Summit 2024
Come together with fellow cybersecurity experts at the MSSP Virtual Cybersecurity Summit and acquire valuable insights to effectively combat the cyber threats that may emerge in 2024. This event will feature presentations by renowned professionals and thought leaders, as well as representatives from leading global providers of cybersecurity solutions. The MSSP Virtual Cybersecurity Summit presents an opportunity for you to engage with peers an...
Updates to the CJIS Security Policy - W...
The FBI Criminal Justice Information Services (CJIS) Security Policy sets the baseline security standards that both criminal justice and noncriminal justice agencies must adhere to in order to access and safeguard criminal justice information. Currently, this policy is undergoing a comprehensive modernization effort, introducing significant changes that will affect the entire CJIS community and their technology partners. Join the Center for Di...
Unlock the Full Potential of Your Team...
In today’s rapidly evolving business landscape, staying ahead means constantly learning and adapting. That’s where the Pinnacle Series learning solutions come in - a platform tailored specifically to the unique needs of the AEC, design, and manufacturing industries. Pinnacle Series isn’t just another learning solution. It’s a comprehensive platform that helps organizations face their learning and development challenges...
Enhancing Natural Disaster Preparedness...
In a world where natural disasters affect billions annually, staying reactive is no longer an option. Unpredictable storms and disasters continue to challenge communities, disrupting daily life and endangering residents. Despite advancements, many cities struggle to stay ahead. Join Government Technology, Governing, SAS, and Intel for a live webinar on July 11 to explore next-generation natural disaster prediction and preparedness management s...
OT/IoT Zero Trust Security for Water an...
Recently, there has been a surge in alerts and warnings concerning cyberattacks from state-sponsored threat actors on U.S. critical infrastructure including water systems and electric distribution systems. EPA, CISA, and the FBI strongly recommend system operators take steps outlined in Top Actions for Securing Water Systems. In addition, DOE has released the Cybersecurity baseline and NERC has nearly finalized the update to CIP-015-1. Both gu...
Developing The Technical Proposal In Go...
Developing The Technical Proposal In Government Contracting Come join us weekly as we train and prepare you to capture government contracts. These sessions are designed to prepare those enrolled in the Certified Capture Manager (CCM) Program to prepare their businesses for success and to prepare them to become certified capture manager professionals. Proposal Writing – Part II: Developing the Technical ProposalShort cut Guidance: Section...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.