Third-Party Access Governance: Eliminat...
As the Great Resignation makes its way to the public sector, the need for third-party workers will continue to rise. Security teams are overwhelmed with the sheer volume of joiners, movers, and leavers in the employee workforce and the increased requirement for third-party workers, contractors, and supply chain partners to continue operations. Managing identities and access policies across your user base requires integrated tools to onboard th...
Distributed Tracing - The Steel Thread
As the public sector continues to adopt modern software development practices and architectures to drive innovation and accelerate the delivery of strategic projects, the complexity of managing distributed environments presents a growing challenge. Cloud computing, microservices, open-source tools, and container-based delivery makes it difficult to quickly diagnose and resolve performance issues and errors that can impact the citizen experienc...
Webinar! Cloud is Costing Me What?! Dis...
Leave your cloud pain points at the door and learn the value of building FinOps best practices. Incorporating these practices will provide your agency with mature processes that maximize the business value from cloud spend. We’ll provide FinOps lessons learned, from project planning to cost optimization. Wherever your agency is in its cloud journey, get insights to optimize cloud spend and meet your cloud goals. Objectives: Learn about F...
June 29, 2022
Organizer:
ACT-IAC Location:
Webcast
ISTELive 22
LEARNING THAT WILL CHANGE THE WAY YOU EDUCATE During 650+ sessions at ISTELive 22, you’ll discover strategies, activities and research-based practices that will change the way you educate. You’ll be learning from presenters who are just like you – global educators who love to share their experiences. And you’ll get the dose of inspiration you need thanks to our enthralling, thought-provoking featured speakers from educa...
ATARC 2022 AI & Data Virtual Summit
AI systems need to be ethical, responsible, transparent, and explainable. AI and ML systems are greatly dependent upon their training data to ensure results from the algorithms are fair and ethical. These concerns are particularly important for government decision making that may affect citizens and services. Listen in as topic experts explore how the use of artificial intelligence to increase fairness and equity has become important throughou...
June 28, 2022
Organizer:
ATARC Location:
Webcast
Optimizing Enrollment Outcomes for High...
Over the past decade, colleges and universities in the United States have seen a steady decline in enrollment, and that trend is not expected to reverse any time in the near future. Stretching across various functions from marketing, admissions, financial aid, and institutional research, the need for gathering deeper insights from data and having a strategic enrollment plan has never been greater. Join Alteryx and HAI Analytics as they review...
Data First Digital Transformation for U...
During this webinar, attendees will learn how universities modernize their data ecosystems to deliver a multitude of outcomes like how: University of Pennsylvania uses Talend Data fabric to enable the movement of data from on-prem to cloud and back in support of their Alumni giving application with improved customer experiences for fundraising Case Western uses Talend Data fabric in a micro-services architecture to move data from both on-prem...
Don't Get Blindsided by Mobile Gaps in...
Mobile Application Security is a real threat-vector. Whether you are managing existing mobile apps or building your own, the need to test them for vulnerabilities on a regular basis is now more critical than ever. From the Executive Order to FISMA compliance, the requirement to include Mobile App vetting is now upon us.Software Supply Chain Risk Management for Mobile Applications, from large MDM systems to only a handful of 3rd-party created a...
Summertime Refresh: Securing Chromebook...
Join this webinar with SentinelOne, Zimperium, and Carahsoft where our mobile experts will discuss: Why states and educational institutions use Chromebooks Cyber threat challenges and concerns Chromebook users face What can be done to protect Chromebook users, including K-12 students How Chromebooks play into K-12 holistic endpoint security strategy
Threat Predict -Leveraging AI/ML to Pro...
Preventing known threats is no longer enough to keep you protected. The mere volume of logs and events often presents a significant challenge for security teams. Through testing and research SkyePoint engineers recognized the advantages of strong ML concepts and developed an approach to leverage them through a collaborative effort between human analysts and AI. This results in a significant increase in the ability to obtain and identify potent...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.