Lessons States Learned from COVID-19: A...
How are states leveraging technology to adopt the new COVID era? State and Federal governments have needed to embrace a new way of doing business, with emerging technologies like AI and Machine Learning accelerating approval. Join Yext for a complimentary webinar to learn how state leaders are turning the pandemic into a promising future filled with innovation and creativity. Specifically, this discussion will cover: How technology innovation...
Zero Trust Is Not One Size Fits All: Wh...
Join experts from Appgate, Tenable, and Carahsoft as we discuss why the government and industry need to implement a dynamic Zero Trust strategy, and strategies to facilitate securing these platforms and data. In this webinar, you will learn about: How Zero Trust fits into IT, OT, and IoT Common use cases for integrating Zero Trust into IT/OT/IoT security Benefits organizations can expect from implementing a comprehensive Zero Trust strategy ac...
Lessons States Learned from COVID-19: A...
How are states leveraging technology to adopt the new COVID era? State and Federal governments have had to think fast to embrace to a new way of doing business. Emerging technologies like AI and Machine Learning have helped accelerate approval. Join Yext for a complimentary webinar and learn how state leaders are turning the pandemic into a promising future filled with innovation and creativity. Specifically, this discussion will cover: How te...
Adobe ColdFusion Workshop
Join our complimentary Adobe ColdFusion Workshop to learn how you and your agency can leverage Adobe ColdFusion to create amazing web content. This one-day training will cover all facets of Adobe ColdFusion that developers need to build applications that can run across multiple cloud providers or on premise. Specifically, the workshop will explore: The major features in the latest release of Adobe ColdFusion How to use Adobe ColdFusion Markup...
Hyperconverged Infrastructure for the M...
Datacenter requirements are evolving and the Navy needs a durable platform that delivers the full power of Hyperconverged Infrastructure (HCI) for workloads in environmentally-challenging locations and/or space-constrained areas. Whether you are deploying a data center at a forward operating base, on a ship/submarine, running real-time GPS mapping on the go, or implementing video surveillance in remote areas, this session will teach you how De...
Securing Your Environment with Automation
Federal agencies are now required to adopt a Zero Trust architecture and leaders must develop plans to implement the IT tools necessary to meet regulations. Implementing a Zero Trust architecture should strengthen other existing security practices and tools, it doesn't require a massive acquisition of new technologies.Red Hat has the resources to help you understand current threat environments and why security automation practices are necessar...
A Cybersecurity Playbook on Maximizing...
In this webinar, featured speakers Fernando Maymi, Dr. Michael Ehrlich, and Maria Thompson will give public sector stakeholders a playbook on securing cloud environments, enabling anonymous threat information-sharing across the public and private sectors, and ways to meet the objectives of the Biden EO on "Improving the Nation's Cybersecurity." You will also learn the importance of removing barriers to sharing threat information and developing...
AI/ML Learning Workshop: Trusted AI
AI mimics human cognitive functions while machine learning is a component of AI, which involves the training of algorithms or models that then give predictions about data it has yet to observe. AI/ML and Robotic Process Automation (RPA) are meant to augment humans in the workforce, not merely replace people with autonomous robots or chatbots. To be effective, federal agencies must strategically organize around the right people, processes, and...
Preparing Your Agency for IIJA: How to...
Many DOTs and MPOs have been hit hard by the pandemic. The compounding impact of a reduction in funding and labor shortages resulting from "The Great Resignation", demand agencies rapidly transform to gain the efficiencies necessary to maintain and improve roads and transit systems. Fortunately, The Federal Infrastructure Investment and Jobs Act (IIJA) brings hope for many state and local departments and agencies for the funding required to su...
Don't Get Blindsided by Mobile Gaps in...
Mobile application security is a real threat-vector. Whether you are managing existing mobile apps or building your own, the need to test them for vulnerabilities on a regular basis is now more critical than ever. From the Executive Order to FISMA compliance, the requirement to include mobile app vetting is now upon us. Software supply chain risk management for mobile applications, from large MDM systems to only a handful of 3rd party created...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.