Back to Search Begin New Search Save Search Auto-Notify
(IAM) Advantage Unleashed
Attendees of this on-demand webinar learned: Best practices for efficient integration and delivery of identity and security solutions for Zero Trust Architecture Why a best-in-class approach is required to drive real identity security value How to address audit gaps and meet mandated requirements
Add Favorite
Accelerating Time to Insights for the P...
For scalable analytics in a secure data environment, the public sector is turning to Plotly Dash Enterprise. As a comprehensive platform for building interactive Python data applications, Plotly Dash Enterprise stands out as a trusted solution for real-time decision-making. During this webinar, attendees: Discovered Python-based analytics use cases across the government sector, from advanced visualization to automated reporting Learned how dat...
Add Favorite
Mastering AWS Security: Leveraging Pris...
Attendees of this on-demand webinar learned about: Current trends in SLED cybersecurity Key strategies for securing your network, whether on-premises or in the cloud Elevating your cloud cybersecurity with Prisma Cloud to meet the demands of today's dynamic environments
Add Favorite
Experimenting with Messaging App Vulner...
This on-demand webinar explored Corellium GlitchChat and discussed: How to use Corellium GlitchChat in your security research work The current threats that target mobile messaging apps How 0-click methods steal data and compromise devices
Add Favorite
Safeguarding the Future: Navigating IoT...
During this on-demand webinar, attendees learned about: The backstory of IoT Why hackers love smart cities, buildings and educational Institutions What can be done now? The unexpected business value
Add Favorite
The Path to Successful CMMC: Expert Ins...
This virtual discussion featured Matt Travis, CEO of The Cyber AB – the official accreditation body of CMMC – and an expert panel discussing the requirements of CMMC, unpacking the layers and levels of cybersecurity preparedness it demands, and bringing their real-world experience to the table. Invaluable insights into the strategic and tactical steps companies must undertake to navigate their compliance journey successfully were s...
Add Favorite
DocuSign Arizona State User Group
Attendees Joined us on April 16th to discuss how you can do more, with less; with Docusign. Anthony Jacovino, the CIO for the Arizona Registrar of Contractors, discussed how Docusign has enabled him to simplify his workflow. He spoke about the countless ways agencies are optimizing their efficiency with limited resources, all through the use of Docusign.
Add Favorite
Hyper-Fast Data Movement and Remote Access
View our webinar featuring Vcinity’s Chief Technology Officer, Steve Wallo, on April 16th, and learn how leading agencies use cutting-edge technology to fast-track their edge advancement in an AI world. In this on-demand webinar recording, expect to learn: Best practices for data curation and model training to optimize AI outputs from the edge. How to leverage accelerated data access solutions to establish a continuous data pipeline acro...
Add Favorite
Understanding the Quantum Cybersecurity...
The quantum computing threat is a clear and imminent danger, having the potential to completely disrupt all secured data, information systems and infrastructure. As we enter the quantum computing era, adopting a post-quantum crypto-agile encryption posture should be one of the top priorities agencies adopt and employ to fortify their proactive stance in cybersecurity. During this webinar, attendees learned about quantum computing power and the...
Add Favorite
Navigating OT Security in the DoD
Attendees of this webinar gained insights on: Current threats that result from converged IT/OT operations Recent OT security legislation and impacts on the DoD The unique use cases for OT security in the DoD Tips and mitigation strategies for managing OT security threats
Add Favorite
Back to Search Begin New Search