Back to Search Begin New Search Save Search Auto-Notify
Seton Hall University Modernizes Identi...
Seton Hall University Modernizes Identity with Okta At Okta, they focus on two main themes which are to protect campuses from security threats while making the user's experience simple and enjoyable. Higher education has taken great steps forward to automate identity management, but most colleges and universities are just starting their path to a true frictionless experience by eliminating passwords and incorporating device trust into their ac...
Add Favorite
Deliver Impressive Visual Messaging Wit...
Government agencies are struggling with ever-increasing content demands and a growing number of content collaborators teleworking. The best way forward is for agencies to create more content faster, through seamless collaboration, asset sharing, and access to essential design elements, no matter your location. The tools and services within Adobe InDesign empower creatives to collaborate to deliver impressive visual messaging, all while working...
Add Favorite
Red Hat Ansible Webinar Series: Automat...
View our on-demand webcast to see Red Hat's Dan Lemus and partner experts' insights on Red Hat Ansible, Red Hat's industry-leading platform for building enterprise-wide IT automation. Automate Networks to Accelerate Operations Erik Ellner, Director, State, Local & Education, Dynamic Systems The first step in digital transformation is automating your current processes, freeing your teams to focus more on innovation, and less on day-to-day t...
Add Favorite
Digital Document Experiences for Enhanc...
In the past few months, public sector agencies have been adjusting to new realities, such as collaborating with colleagues remotely instead of having in-person interactions. Adobe Document Cloud (DC) is revolutionizing the way that government agencies manage their day-to-day document processes with the world's leading PDF and electronic signature solutions.With Adobe Acrobat DC and Adobe Sign, agencies nationwide are empowered to modernize the...
Add Favorite
Zero Trust Security for the Digital Workspace
Security is an ongoing challenge for organizations and with today’s dynamic workforce, the challenge is ever-increasing. Rapidly changing work styles and increased use of SaaS applications have resulted in the End-User Computing Zero Trust model becoming one of the most important forms of alternative security, an architectural mindset aimed at securing and protecting your data. VMware Workspace ONE combines Zero Trust conditional access...
Add Favorite
Investigations on the Darknet: Case Stu...
Andrew Lewman, the Executive Vice President of DarkOwl, will explore various case studies that involve utilizing information found on the darknet as a part of criminal investigations. Using these real-world, darknet-based examples that have been selected for an intelligence community-based audience, Andrew will walk-through examples of different methodologies law enforcement can use to de-anonymize threat actors, the different tools and approa...
Add Favorite
Tableau Learning Series: All Things Mapping
This foundational presentation will showcase the scope of Tableau. At the end of this presentation, the attendees will learn how easy it is to create maps with just a simple mouse click. Attend this viewing from Tableau to: Learn the core Tableau Mapping functionality Discover how Tableau reads data and assigns geographic roles to map data that is locked away in tables Understand how companies might have specific geographies that need mapping...
Add Favorite
Taking the Kinks Out of the Supply Chain

CANCELED

Supply chain management is critically important to running and maintaining an agency's IT systems, however it has not historically drawn much attention from the C-suite. Currently, many federal agencies use a manual process managed on spreadsheets which can lead to increased cost and risk.New directives have mandated that the Department of Defense must begin monitoring the supply chain within the Department's Risk Management Framework. These c...
Add Favorite
Seeing the Cybersecurity Battlefield: A...
Cybersecurity is a complex problem, constantly evolving and shifting with teams unable to understand where threats are emerging. While the tools being used are valuable and have costly limitations, operators need a full picture of the cybersecurity battlefield. Are you making the most out of your security investments? How can we enrich the picture for each team to ensure that they have the best possible information and insight into the securit...
Add Favorite
Webinar: Predict and Prevent with Splunk
Join us for a discussion on how you can leverage Splunk to visualize, monitor, and manage the performance of the key services that power your mission through real-time dashboards, reports, and alerts. Whether you're developing applications or running, securing, and auditing IT - Splunk can help you gain fast value from your data. During this informative webinar, we will discuss: How to leverage Splunk Enterprise, IT Service Intelligence (ITSI)...
Add Favorite
Back to Search Begin New Search