Back to Search Begin New Search Save Search Auto-Notify
Advancing Technology and Innovation For...
The US Department of Commerce is responsible for promoting economic growth, job creation, and international trade. It has a wide range of responsibilities and 13 different bureaus and offices. These include Census Bureau, National Institute of Standards and Technology (NIST), National Oceanic and Atmospheric Administration (NOAA), Patent and Trademark Office (USPTO), and others. The CIO of the Department of Commerce is responsible for developi...
Add Favorite
Splunk Compliance Essentials Virtual Workshop
Attendees joined us for a Splunk presentation on the Splunk Compliance Essentials App. This is an app that is free to download from Splunkbase and will assist customers with meeting their government requirements. During this virtual workshop, attendees learned:What Splunk Compliance Essentials can do for their installThe level of customization that can be conducted once installation is doneWhat kind of logs to be collectionsHow to streamline c...
Add Favorite
Optimizing Digital Design Workflows
Delivering personalized customer experiences means creating more content than ever before, making increased content velocity crucial to successfully engaging your audience. With Adobe solutions, you can streamline processes, foster collaboration, and deliver seamless digital experiences. Access this on-demand resource for an insightful Adobe Experience Manager Assets webinar where we explore the latest advancements in digital asset management....
Add Favorite
CTO SESSIONS: Everything You Need to Kn...
Without secure, enterprise-managed identity systems, adversaries can take over user accounts and gain a foothold in an agency to steal data or launch attacks. The Federal Zero Trust Strategy prioritizes defense against sophisticated phishing and directs agencies to consolidate identity systems so that protections and monitoring can be consistently applied. Multi-factor authentication (MFA) plays a critical part of the Government’s strat...
Add Favorite
Debunking False Claims on the Cyber Bat...
Following the tragic events in the Middle East in October, a spectrum of cyber actors turned to social media to express their sentiment surrounding the crisis. Shortly thereafter, hacktivists joined the fray, engaging in defacements and Distributed Denial of Service (DDoS) attacks on various nation-state websites. While many of these claims were legitimate, others were later debunked, underscoring the importance of verification and validation...
Add Favorite
Security and Compliance in 2024: Trends...
A content management system (CMS) is a key piece of the foundation for building modern digital experiences that span farther than just your website today. Global brands such as Mars, Stanley, Black & Decker, NASA and many more have trusted Drupal as their CMS to power their brand differentiating experiences. However, with a rise in cyber attacks, the security of your digital platform is critical. Join us for an insightful conversation with...
Add Favorite
Get Started with Digital Verifiable Cre...
Thank you for your interest in our webinar. Attendees of this on-demand webinar: Were given an overview of digital verifiable credentials, including relevant national standards Learned how an enterprise IT platform easily integrated with existing government agency systems can be used to issue more secure, portable and user friendly government issued permits and licenses than traditional paper approaches Learned how digital verifiable credentia...
Add Favorite
Optimizing Threat Detection and Respons...
In recent, The White House issued a National Security Memorandum (NSM-8) specifying how the defense, national security and intelligence community are to bring their national security systems (NSS) into compliance with the Executive Order 14028 on improving cybersecurity across the federal government. Attendees joined Elastic experts for a comprehensive overview of the Elastic platform's robust cybersecurity capabilities, focusing on compliance...
Add Favorite
Elevate Transparency: Democratizing Ele...
The Board of Elections often faces limitations with transparency to the public. Current applications generate static reports, offering only a snapshot of data without the ability to illustrate real-time data before, during, and after elections. These text-based tables often require IT intervention, causing a delay in updating the citizens of their cities, counties, and states. Attendees of this webinar learned how Tableau has changed the way t...
Add Favorite
DoDIIS Worldwide Webinar Series: Three...
The increasing sophistication of cyber threats, especially those targeting critical infrastructure, has catalyzed a national directive for enhanced cybersecurity measures, as signified by Executive Order 14028. Nation-state actors and other advanced threats are exploiting software supply chains with such efficacy that the integrity of our critical systems is at constant risk. The diverse and complex nature of the software utilized by agencies...
Add Favorite
Back to Search Begin New Search