Back to Search Begin New Search Save Search Auto-Notify
Bridging Borders: How AI and Public Inf...
This webinar brought together border security and artificial intelligence (AI) experts to explore best practices for integrated border management, with a specific focus on the use of AI and publicly and commercially available information sources to detect and prevent cross-border crime. Participants learned: How AI can improve the effectiveness of border management systems in a myriad of ways, such as by increasing the accuracy of name matchin...
Add Favorite
Mission First: Public Sector Podcast Series
Listen on-demand to episode three of our podcast series dedicated to covering the latest and greatest in IT achievements - keeping you ahead of the competition. Hear from Elizabeth Cappello, Deputy Chief Information Officer (CIO) for the Department of Homeland Security (DHS), and Craig Bowman, Senior Director - Federal for VMware, who will discuss: Meaningful implementation of Artifical Intelligence (AI) in cybersecurity How to view open stand...
Add Favorite
Accelerate Your Datacenter Evacuation w...
During this on-demand workshop, subject-matter experts discussed: How VMC on AWS can accelerate datacenter evacuations Procurement and certifications How VMware Cloud works VMware Cloud use cases
Add Favorite
The Craft of Creating Virtual Experiences
Watch Adobe’s 3-part on-demand webinar series, The Craft of Creating Virtual Experiences, with Adobe Connect Evangelist, Alistair Lee. Each on-demand webinar focuses on a different component of designing your virtual meetings, events, and trainings to maximize effectiveness and showcase how to leverage the full capabilities of Adobe Connect. Fill out the form below the table to access the session recordings, available slide decks, and he...
Add Favorite
User Centered Digital Experience Series...
8 Barriers of Digital Service Adoption Positive government agency service adoptions are becoming increasingly important as government agencies focus on creating seamless customer experiences (CX). Reducing barriers to digital service adoption and ensuring more users successfully switch requires government agencies to provide intuitive digital experiences that thoughtfully guides individuals through the process. In this session, experts will ex...
Add Favorite
How to Resist Ransomware
Hear from federal cyber leaders at DOD and CyberArk on the best tips, tricks and strategies for resisting ransomware and protecting federal data. Ransomware attacks against federal IT systems surged to unprecedented levels at the beginning of the COVID-19 pandemic and show no sign of abating, with ransomware losses surpassing $1 billion in the second half of 2021. Federal agencies handling mission-sensitive medical, financial, demographic and...
Add Favorite
Tech on Tap: F5 Future Proofing Your Ap...
APIs are the lifeblood of the internet today. Everything from booking flights to reading your daily newsfeeds is all made possible by the growth of data sharing using Application Programming Interfaces (APIs). With the growth of modern applications, developers often unintentionally leak sensitive datasets. The proliferation of APIs has marked them as a prime target for malicious actors and nation-states leaving the DoD and the War Fighter vuln...
Add Favorite
Internal Mobility: Talent Acquisition a...
To address the unique challenges faced by government organizations, it is imperative to prioritize the development and retention of existing employees through robust internal hiring processes and career development pathways. Watch LinkedIn's webinar and demo to learn how LinkedIn's Internal Mobility features, seamlessly integrated within our Hiring + Learning solutions, provide an "internal" lens to the tools government professionals already u...
Add Favorite
Kickstart to Compliance Series: Step Tw...
Join us for the next session of our Kickstart to Compliance webinar series covering the second step on your journey toward achieving ZTA data pillar optimal level. To comply with federal mandates and protect sensitive data, agencies must develop an approach to identify and prioritize data protection needs. This includes understanding the different techniques for field and record level protection, such as encryption, persistent data masking, d...
Add Favorite
It's Your World and We Prevent Adversar...
Adversaries are relentless and continue to go after critical government infrastructure, communities, and schools. In today’s threat landscape, it takes a team and tools to prevent these cyber-attacks. During this webinar, experts from Mimecast and CrowdStrike discussed how to harness threat intelligence in a single XDR framework. Register to view this on-demand recording.
Add Favorite
Back to Search Begin New Search