Back to Search Begin New Search Save Search Auto-Notify
Insider Risk Programs: Three Truths and a Lie
In this webinar, Everfox Director of Enterprise User and Data Protection, Michael Crouse, shares insights on why insider risk management is not about cyber controls and checklists that only show what occurred without indicating why. Insider risk sits at the junction of organizational and technical controls where an insider risk management plan must address the needs of the program before, during and after critical events, not just during incid...
Add Favorite
Leveraging Digital Data to Enhance Pris...
During this webinar, Cellebrite experts Lee Papathanasiou and Matt Goeckel dove into innovative strategies and technologies used to combat criminal activities within correctional facilities. This webinar highlighted the importance of digital intelligence in identifying and mitigating threats posed by contraband devices, ensuring the safety of both inmates and staff. Attendees gained insights into the latest tools and methodologies for collecti...
Add Favorite
Optimizing Naval Logistics and Readiness
During this session, our expert speakers dove into how Salesforce’s powerful technologies, including Tableau, Mulesoft, and Slack, integrated with AWS’s robust cloud infrastructure, are reshaping naval operations.Attendess learned:Innovative Solutions: How these technologies enhance operational efficiency, asset management, and readiness planning.Practical Use Cases: Real-world examples of seamless data integration, real-time analy...
Add Favorite
Navigating UCaaS Migration: A Strategic...
We wrapped up an insightful webinar featuring Zoom and Packet Fusion, where public sector leaders explored the transformative potential of Zoom’s integrated UCaaS (Unified Communications as a Service) platform for State, Local Government, and Education (SLED) organizations. The session highlighted how Zoom’s UCaaS seamlessly integrates voice, video, messaging, and file sharing, enabling teams to communicate effortlessly across depa...
Add Favorite
Navigating the Complexities of Multimed...
The growing volume of digital evidence, like CEM and CSAM, can make identifying and preserving crucial information overwhelming. Our upcoming webinar will provide strategies to streamline your workflow and leverage advanced tools like filters and quick video frame previews to speed up evidence review and improve accuracy. Access this on-demand webinar recording to learn how cutting-edge digital forensics can transform your investigative proces...
Add Favorite
AI for the Rest of Government Part One:...
This webinar identified and explored current concerns regarding the adoption of AI in government agencies. Attendees created a foundational understanding of how to utilize AI within their agency.This session explored:How agencies can prepare to take advantage of AI.How to quickly and easily organize digital messes at scale.How agencies can best communicate with employees about AI.Register now to start your journey in understanding and utilizin...
Add Favorite
Capturing E-Rate Pilot Dollars For Your...
Student safety is a top priority, especially as cybersecurity challenges continue to grow in the educational environment. The problem we face today is how to effectively leverage AI to enhance security while improving efficiency and reducing employee burnout with limited staff.How can we ensure that our cybersecurity teams are equipped with the tools they need, despite resource constraints?During this complimentary webinar, attendees learned:H...
Add Favorite
How to Create a Framework for Winning P...
Also read: The Best Capability Statement for Government Contracting in 2025 How to Create a Framework for Winning Proposals | Shift Left To win, your proposal must be more than just 'compliant'. You need to stand out from your competitors. In this training, Neil McDonnell explains what goes into a 'winning proposal' and the framework that makes proposals both compliant AND compelling. 01:00 ➣ • Intro to the Ingredients of Winning...
Add Favorite
2024: Big Tech In FED Gov - IBM (7 of 15)
This Webinar Series will profile the BIG TECH companies and their intersection with the US Federal Government. We will look at the big tech contracts within the Defense Department, Civilian Departments and Independent Agencies as well as stock price, current news, federal contracting trends, lobbying information if available, and more. Don't miss this lively data filled webinar series courtesy of federal data and analysis from GOVSPEND. Webina...
Add Favorite
Protecting Modern Applications and Secu...
Government departments and agencies are increasingly turning to modern applications to improve their communications with and responsiveness to the public. Government records and data that were previously isolated and difficult for the public to access are now becoming widely available through APIs. While the data being made public through APIs is not the concern, the increased threat vector is.Securing modern API based applications in such an...
Add Favorite
Back to Search Begin New Search