Back to Search Begin New Search Save Search Auto-Notify
Enhancing Government Security: Seamless...
HID's experts explored an insightful presentation on how their cutting-edge Credential Management Solutions and PKI-as-a-Service (PKIaaS) can transform your cybersecurity infrastructure, enabling seamless user authentication, ease of lifecycle management, and secure communications while meeting regulatory and trust requirements. In this presentation, we:Explored the human aspects of managing digital identity and certificate lifecyclesDemonstra...
Add Favorite
2024: Big Tech In FED Gov - Amazon (8 of 15)
This Webinar Series will profile the BIG TECH companies and their intersection with the US Federal Government. We will look at the big tech contracts within the Defense Department, Civilian Departments and Independent Agencies as well as stock price, current news, federal contracting trends, lobbying information if available, and more. Don't miss this lively data filled webinar series courtesy of federal data and analysis from GOVSPEND. Webina...
Add Favorite
No Wrong Door to Care: Egen Opioid Care...
The Opioid Epidemic Data, Analytics, and Care Management solution provides evidence-based insights and risk factor analysis to combat the opioid crisis. The Egen Opioid Care Management Platform follows a "No Wrong Door to Care" approach, offering personalized care plans and referrals to support patient recovery. With a unified view of opioid care management, the platform helps shape policy and treatment strategies while enabling cities and cou...
Add Favorite
Strengthening SLED Security
State and local governments are increasingly becoming the target of cyber attacks from bad actors, threats such as ransomware pose a serious risk, and many organizations are not prepare to respond quickly and effectively in the event of a cyber attack. Attendees heard how ServiceNow allows organizations to centralize their security workflows and reduce busywork for already overloaded security teams by utilizing automated workflows and AI. Perf...
Add Favorite
Modern Intelligence with Connected Data...
Conventional tools used in data visualization often struggle to adequately retrieve and present the intricacies of large, connected data. These tools might not effectively illustrate how complex relationships and dependencies change over time. During this webinar, the MarkLogic/Progress team took a deep dive into how to explore your complex data in a visual, interactive and comprehensive way with applications custom built for advanced decision...
Add Favorite
Designing Effective Dashboards for Publ...
This webinar walked through the steps of building impactful dashboards. Including how to define the goals of a dashboard and choose the right visual elements to ensure that it delivers actionable information clearly and efficiently. Tailored for analysts, business leaders, and decision-makers, this session covers best practices for structuring your dashboard builds, integrating key metrics and ensuring optimal user engagement. During this webi...
Add Favorite
Advanced Insights for Federal Entrust P...
During this session, attendees deepened their understanding and enhanced their experience with our PKI solutions. Attendees also had the opportunity to:Gain advanced knowledge of PKI technologies and trends.Discover new ways to optimize their existing PKI setup.Network with other federal Entrust PKI users and industry experts.Product roadmaps and updates on nShield, KeyControl and more.We were joined by various speakers who provided insights i...
Add Favorite
Babel Street DoDIIS Webinar Series 2024
Modern supply chains face a growing array of threats, from adversarial disruptions to contested logistics, creating vulnerabilities that can impact national security and economic stability. Traditional intelligence gathering methods often struggle to keep pace with the dynamic nature of these risks. Defense and intelligence organizations need extensive data access to proactively address supply chain challenges, and OSINT offers valuable insigh...
Add Favorite
Three Ways to Build Cyber Resilience Be...
How confident are you that you can detect external threats to your government organization? Cybersecurity teams are investing significant time and resources into internal monitoring, while making use of public data. With proliferating external factors to consider and an ever-increasing number of digital assets to monitor, it is becoming increasingly difficult to achieve continuous threat detection in a single environment.During this webinar, T...
Add Favorite
The #Americans: A Look at Chinese State...
Thank you for your interest in our Graphika Webinar! Graphika revealed how a Chinese state-linked covert online influence operations have become more aggressive in its efforts to infiltrate and sway U.S. political conversations ahead of the 2024 elections. Attendees of this webinar learned about:The evolution of Chinese influence operations targeting the U.S. to incorporate more advanced deceptive behaviors.Private research demonstrating how t...
Add Favorite
Back to Search Begin New Search