Defending Against the Quantum Threat: F...
The day a cryptographically-relevant quantum computer (QRQC) with enough power to break modern encryption is coming and world governments are taking action and advising agencies and commercial entities to start taking action now. Although these powerful quantum computers won't exist for another 5 to 15 years, attackers are already taking advantage of the opportunity to steal valuable secrets through harvesting attacks - where a copy of the dat...
Joint All-Domain Command and Control (J...
JADC2 Strategy provides a vision of a connected battlefield, improving joint force command and control capabilities. Knowledge is power, and a connected environment provides greater insight from increased sensors on the ground, sea, air, and space. But what happens when communication becomes less than perfect? Can JADC2 continue to operate with Denied, Disrupted, Intermittent, and Limited (DDIL) communications? This presentation by HPE ...
ISV Briefing Series - Austin: A No-Cost...
SMX and Carahsoft in collaboration with Amazon Web Services (AWS) joined in Austin, TX on July 22, 2024 for a Power Happy Hour! This briefing featured SMX's No-Cost Guide highlighting a quick start guide to achieving FedRAMP compliance and an overview of the Carahsoft Amazon Web Services (AWS) ISV Program. Want to see what was covered during this briefing? Check out the slide decks below!
Unlocking the Power of AI
In light of the recent White House Executive Order on Artificial Intelligence, the need for a comprehensive understanding of AI technology has never been more critical for Federal Agencies, State Governments, and Local Municipalities. The research and advisory team at New York City-based TAG Infosphere has created a series of Tailored Courses designed specifically to meet the AI learning needs of U.S. public sector departments and agencies. Du...
Fortifying the Frontlines: Mastering Cy...
As cyber threats continue to evolve, so does the need for a sophisticated approach to managing the cybersecurity workforce and ensuring compliance within DoD and federal agencies. This webinar explores how DefenseReady by Permuta provides integrated solutions that not only streamline workforce management but also enforce rigorous security protocols, ensuring that your agency remains both effective and compliant in a landscape of increasing cyb...
How AWS RDS Can Help You Simplify Oracl...
Is your agency enjoying Oracle technology but struggling with the licensing? Luckily, TekStream's Oracle Licensing Assessment (DB OLA) can easily streamline the process. With features like a comprehensive review of your current environment, usage of unique-to-AWS cost savings, evaluations of your current Oracle estate, and Amazon Web Services (AWS) mapping, DB OLA makes understanding your Oracle licensing easy. Attendees joined TekStream, AWS...
Digital Detective Work: Enhancing Onlin...
In modern investigations, online research is a pivotal yet challenging component. The vast volume of publicly available information is a formidable task for investigators aiming to connect the dots across expansive digital landscapes. This webinar delves into the evolving role of online investigations, emphasizing the complexities of navigating dispersed information and offering practical strategies to enhance digital detective work. During th...
Automate Critical IT and Security Tasks...
IT and security teams today must do more with less, all while facing rising security demands and pressures to innovate. Attendees joined on July 24th to learn how Okta Workflows can help teams keep up by automating Identity processes at scale - with pre-built templates that remove the need to write code. Attendees also learned about how implementing Okta Workflows can help your team accelerate time-to-market, improve security posture, and redu...
How Tax Agencies Can Translate CX and E...
Tax agencies have a common set of objectives:Improve taxpayer experienceReduce advisor training time and accelerate speed to competencyImprove operational metrics such as call wait time, first-contact resolution, and digital adoptionImprove tax collection and complianceAdhere to agency policies and procedures, as well as federal guidelines and standards on security and auditing This is exactly what eGain has been doing for the Internal Revenue...
Best Defense is a Great Offense: Integr...
Federal agencies face an ever-evolving landscape of cybersecurity threats that require dynamic and robust response mechanisms. To stay ahead of bad actors, agencies need to automate the detection, prioritization, and remediation of vulnerabilities in real-time. Continuous authorization and monitoring is also critical to a proactive approach to cybersecurity that aligns with the Federal Risk and Authorization Management Program (FedRAMP) and ot...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.