Back to Search Begin New Search Save Search Auto-Notify
Decoding Digitalization Defense: Friend...
The adoption and implementation of digitalisation is well underway in most of society, with defence organisations at various stages of the transition. However, are any of them losing out due to the speed of adoption? Given the “new normal” in warfare we are witnessing in Ukraine, what is their plan to create and maintain information superiority without digitalisation? Defence agencies’ traditional working practices are battle...
June 18, 2024
Organizer: AFCEA Pocono | AFCEA Europe
Location: Webcast
Add Favorite
Engineering Cybersecurity Mitigations f...
Large water utilities are looking to gain efficiencies by adopting new distributed edge devices and digital transformation initiatives incorporating the latest machine learning and AI algorithms. Meanwhile, small to mid-size municipalities, are wanting to maintain their reliability without increasing their rate-base. Yet, a worsening threat environment looms over North American and European operators. Increasingly sophisticated criminal ransom...
June 18, 2024
Organizer: Waterfall Security
Location: Webcast
Add Favorite
Building Responsible GenAI Strategies for HR
Generative AI is not just about technology—it's about transforming HR practices. Register for this session, Building Responsible GenAI Strategies for HR, and gain in-depth insights into the ways you can harness the power of GenAI in human resources while ensuring ethical compliance. You’ll hear from our experts, Allan Sabol and Kim Thomson, about best practices in using GenAI in HR, such as:Maintaining strict ethical and privacy st...
June 18, 2024
Organizer: ServiceNow
Location: Webcast
Add Favorite
HashiCorp Boundary & Vault AWS Immersio...
HashiCorp Boundary is a secure remote access solution that provides an easy way to securely access critical systems with fine-grained authorizations based on trusted identities. With Boundary Enterprise, your organization can rest assured that managing remote access of your users will be secured from this self-managed deployment of Boundary. Bundled into Boundary Enterprise is Boundary Session Recording, which allows organizations to track wha...
June 17, 2024
Organizer: HashiCorp | Amazon Web Services (AWS)
Location: Webcast
Add Favorite
Industrial Control Systems Summit Solut...
Adversaries targeting critical infrastructure systems (power grids, water management systems, heavy manufacturing, oil and gas refineries and pipelines, etc.) have demonstrated detail technical knowledge of control system components, industrial protocols, and engineering operations. These skilled and brazen adversaries continue to launch a combination or Ransomware and targeted ICS tailored attacks against the safety and reliability of critica...
June 17, 2024
Organizer: SANS Institute
Location: Webcast
Add Favorite
A Futuristic Approach to Challenge Your...
Best practices don’t last forever; next practices need to be a focus, too. Gartner Maverick research delivers breakthrough, disruptive and sometimes contradictory ideas that challenge conventional thinking. Part of Gartner Futures Lab, it is designed to explore alternative opportunities and risks that could influence your strategy. It opens the door to challenge your thinking by considering less-obvious developments envisioned by Gartner...
June 17, 2024
Organizer: Gartner
Location: Webcast
Add Favorite
How The Procurement Cycle Works In Gove...
How The Procurement Cycle Works In Government Contracting Podcast Register Here https://streamyard.com/watch/i4P2GUctWDm3 If you own a business that you want to expand from the commercial market to the government market, then this training session is for you. The government is the largest customer in the world and you should be selling your product or service to your country. Find out how you can expand your business by working with Uncle Sam....
June 17, 2024
Organizer: Government Contractors Association, Inc.
Location: Webcast
Add Favorite
Weathering the Volt Typhoon Storm
Join Splunk for this important webinar where we will explore the current threat landscape in relation to Living off the Land (LOTL) attacks. Cyber threat actors leveraging Living off the Land (LOTL), abuse native tools and processes on systems across multiple IT environments, including on-premises, cloud, hybrid, Windows, Linux, and macOS environments. LOTL enables cyber threat actors to conduct their operations discreetly as they camouflage a...
June 17, 2024
Organizer: Splunk
Location: Webcast
Add Favorite
AWS Training and Certification Webinar Series
Join AWS experts for a series of webinars in March-April to learn more about AWS Skill Builder and how your organization can utilize it to maximize your business impact. AWS Skill Builder provides learning options that allow you to develop, reinforce and extend your AWS skills. Upcoming webinar topics include: AWS Skill Builder Overview: This webinar will show you how you can login and activate your subscription and start learning. You'll see...
June 14, 2024
Organizer: AWS Government Team at Carahsoft
Location: Webcast
Add Favorite
Tech & Service Provider CEOs, Establish...
Generative AI (GenAI) gives technology and service provider CEOs an unprecedented opportunity to become operationally lean. This emerging technology can augment and/or automate tasks, workflows and processes in functions such as software engineering, marketing, sales and general administration. Technology and service provider CEOs must establish a concerted approach to addressing this opportunity to guide their organizations toward autonomous...
June 14, 2024
Organizer: Gartner
Location: Webcast
Add Favorite
Back to Search Begin New Search