How a Tweet Becomes a Public Service An...
Chicago's Bureau of Information Technology manages a number of technology solutions bringing a scalable, efficient, enterprise-wide startegy across the city's 30+ departments. Chicago leverages Salesforce Marketing Cloud to streamline communication to all of its citizens during COVID-19. Join us on May 21 to hear how the City of Chicago uses their outreach and enagement platform, step-by-step, and show us how they are using it to surfce priori...
Amplify and Integrate Your Phishing Def...
Phishing attacks are relentless, and attackers continue to find creative ways to evade perimeter technologies such as Secure Email Gateways (SEGs). As malicious emails continue to reach user inboxes, there's increased risk of account compromise, data breach, and malware attacks, including ransomware. However, by combining training and human intuition with trusted intelligence, you will be able to reduce your organization's phishing threat expo...
Adobe Digital Learning Seminar for Canada
As the pandemic has changed the way the world works and operates day-to-day, so has the way in which we disseminate training materials. A virtual training program must adapt to all aspects of adult learning while maintaining a high level of engagement. Join us online for a complimentary seminar to discover how to create and maintain high levels of retention and engagement in an online learning environment. Our team of eLearning experts will te...
3 Signs Governments Are Going Big On So...
It probably won’t come as a surprise to you that 90% of government agencies are on social media. But in the year since COVID-19 first disrupted our daily lives, the way we all use social media has changed. Join this complimentary webinar and discover how the Massachusetts Bay Transportation Authority and other government organizations have applied the momentum for digital to their agency, and learn how to take steps with your current Hoo...
How to Support Complex, Continuous Anal...
Join Ocient in this discussion about Complex Data Analysis at Hyperscale! Multi-Domain Operations proposes a series of solutions to solve the problems of increasingly complex and layered standoffs. The central idea in solving this problem is the rapid and continuous integration of all domains of warfare. Whether it’s social media, open-source intelligence or other sources from cyberspace, being able to modernize systems and analyze incre...
More than a Fling: How to Build Long-La...
Like any strong relationship, long-lasting resident connections require two-way communications. While some current government-to-constituent experiences feel more like speed-dating, effective experiences require more long-term investment. As more governments are building robust web properties, digital services, and multi-channel communications, they’re also turning to feedback tools to capture real-time input from residents. Benefit from...
Modern eDiscovery: How New Data Types a...
Modern ediscovery technology helped find the fraud at Theranos and is being used to analyze a dizzying array of file types. Join us as we dive into the analysis of diverse file types—from emails to Slack, social media, and videos—and witness how ediscovery simplifies complex data correlations. We’ll explore the potential of eDiscovery in prosecutions, inquiries, and even FOIA requests. During this webinar, attendees: Discover...
Solving Investigations with Social Media Data
With new data sources popping up every day, investigators need to constantly evolve to keep up with new data in their investigations. However, with the overwhelming amounts of new data, it's become increasingly difficult for investigators to sort through and link all the individual data points. Watch this on-demand webinar to learn from OSINT expert, Nico Dekens, who provides a detailed account of his experience using social media data and OSI...
Managing the Tidal Wave of Digital Evidence
The size of the digital data universe is doubling every two years, and police investigation is no exception in this trend. Technological innovations like body-worn cameras, license plate readers, in-car cameras, surveillance cameras, gunshot detection, drones, internet-connected devices, cell phones, social media, and more are creating a tidal wave of digital evidence. All of these manual activities waste time that your investigators could be...
The #Americans: A Look at Chinese State...
Thank you for your interest in our Graphika Webinar! Graphika revealed how a Chinese state-linked covert online influence operations have become more aggressive in its efforts to infiltrate and sway U.S. political conversations ahead of the 2024 elections. Attendees of this webinar learned about:The evolution of Chinese influence operations targeting the U.S. to incorporate more advanced deceptive behaviors.Private research demonstrating how t...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.