Back to Search Begin New Search Save Search Auto-Notify
Prioritized Remediation for CMMC Compli...
Cyturus Technologies, Armis, and Carahsoft have assembled a panel of seasoned industry veterans and innovators to demonstrate proven methods for assisting your organization in identifying managed and unmanaged assets, devices, and software, measuring specific risks, and then creating systems and processes for enforcement automation, threat alerting, and prioritized remediation actions. During this webinar you will learn how to: Practically app...
Add Favorite
A Zero Trust Approach to Secure Operati...
The increased risk of cyber-attacks targeting Operational Technology (OT) systems and third-party remote access has skyrocketed in our new hybrid world. Agencies working in converged IT/OT industrial environments must achieve complete visibility, security, and control of operations, and they must understand what third-party vendors (suppliers/contractors) and internal privileged users (operators/admins/remote workers) are doing with their acce...
Add Favorite
More Channels, More Problems: Is Your T...
Students expect their university to provide digital experiences with improved levels of personalization, efficiency and ease-of-use. To meet those demands, school's need to determine which of their current digital solutions are effective and useful, and which are due for a reevaluation. Join Acquia and Mediacurrent experts online as they discuss the higher education technology landscape and the most effective ways to deliver enhanced student e...
Add Favorite
The State of the Phishing Landscape
You don't have to look far to find a headline about a recent breach or compromise within any sector but from a public sector, phishing was behind 70% of government breaches. As threat actors continue to innovate their approach to lure unsuspecting end users with clever, relevant, and timely phishing attacks, and this is showing no signs of stopping. Every corner of the public sector, whether it be education, federal, state, and local agencies...
Add Favorite
Software Supply Chain Risk Management f...
Mobile application security is a real threat vector. Whether managing existing mobile apps or building your own, the need to test for vulnerabilities on a regular basis is more critical than ever. From the Executive Order to FISMA compliance, the requirement to include mobile app vetting is now upon us. Software supply chain risk management for mobile applications, from large MDM systems to only a handful of 3rd-party created apps, is a diffic...
Add Favorite
Adobe Creative Cloud Webinar Series Rei...
Webinar 2: Design Realistic Prototypes That Tell Your Story and Bring Big Ideas to Life Communicating effectively with constituents is a critical function of the public sector, and in our evolving digital age, agencies must ensure messaging is engaging, informative, and accessible to all members of their audience. As our world becomes more visual, utilizing digital assets throughout communication campaigns is imperative - from graphics, image...
Add Favorite
Adobe Creative Cloud Webinar Series Rei...
Webinar 4: Standout Layouts with Typography for Print and Digital Media Communicating effectively with constituents is a critical function of the public sector, and in our evolving digital age, agencies must ensure messaging is engaging, informative, and accessible to all members of their audience. As our world becomes more visual, utilizing digital assets throughout communication campaigns is imperative - from graphics, images, and videos -...
Add Favorite
Adobe Creative Cloud Webinar Series Rei...
Webinar 6: Take Any Idea and Make It Move with Cinematic Movie Titles, Intros, and Transitions Communicating effectively with constituents is a critical function of the public sector, and in our evolving digital age, agencies must ensure messaging is engaging, informative, and accessible to all members of their audience. As our world becomes more visual, utilizing digital assets throughout communication campaigns is imperative - from graphics...
Add Favorite
Taking The Wait Out of Authority to Ope...
Google Cloud understands that the ATO process may feel daunting or cumbersome at times. However, those feelings can be a thing of the past. Join us to hear from Google Cloud technical experts about how Google Cloud can make the ATO process easier for you. During this webinar, we will cover: How to address compliance requirements on Google Cloud An overview of the Google Cloud ATO accelerator Hear about real customer use cases that prove how ea...
Add Favorite
All About OpenFlows WaterGEMS
Learn how OpenFlows WaterGEMS provides superior flexibility and more comprehensive functionality compared to other products, and how it can help with: Analyzing pipe and valve criticality Identifying water loss and managing energy use Building models and simulating networks in real-time Saving time with automated analysis and quick modeling Reducing operational costs by optimizing pumps Providing critical insights and easy reporting to help wa...
Add Favorite
Back to Search Begin New Search