Back to Search Begin New Search Save Search Auto-Notify
Adobe Data & Insights for the Public Se...
Time to Take Agency Insights on the Customer Journey The inability to deliver seamless, relevant cross-channel and cross-device end-to-end experiences results in dissatisfied customers who don’t engage with government for their service needs. During this session, agencies will learn how to leverage profile data sets with analytics data to drive website improvement understanding, optimize communication effort and constituent experience ac...
September 21, 2022
Organizer: Adobe Government Team at Carahsoft
Location: Webcast
Add Favorite
Amazon Connect: Beyond the Basics: Sale...
This small group, interactive workshop series offers an opportunity to take your Amazon Connect skillset to the next level. In this technical series, we'll dive deep into some advanced features of Amazon Connect, for those already familiar with the basic Amazon Connect services. This 2-hour virtual workshop covers core concepts related to the provisioning, configuration, and management of Salesforce Service Cloud Voice. This session will inclu...
September 21, 2022
Organizer: VoiceFoundry
Location: Webcast
Add Favorite
Understanding Mission Critical Back Off...
“Workflow warfare” is a term within the Department of Defense that calls attention to and places value on back office functions, which serve a critical role in mission success but can be overlooked when considering modernization and digital transformation. That concept is applicable beyond the boundaries of the military, however; accelerating those workflows will allow faster transformation and provide advantages in meeting any age...
September 21, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
FCW Workshop: Supply Chain Risk Management
In a digital world where almost everything is connected, protecting the supply chain of products becomes even more critical to protecting the security of the data, the networks, and the people using those products. Several high-profile breaches have been linked to supply chain issues, and agencies have received multiple policy directives and guidance as they work to secure their large attack surfaces. A number of tools are now available to hel...
September 21, 2022
Organizer: GovExec 360
Location: Virtual
Add Favorite
IT Asset Management in the Era of Zero Trust
During this exclusive webinar, moderator Scott Maucione and guest Steve Wallace, chief technology officer at the Defense Information Systems Agency will discuss the IT landscape and asset management in the era of zero trust. In addition, Tom Kennedy, vice president at Axonius will provide an industry perspective. Learning objectives: Thunderdome overview SOAR overview The evolution of the IT landscape Zero trust Industry analysis
September 21, 2022
Organizer: Federal News Network
Location: Webcast
Add Favorite
Infoblox Demo Desk
Interested in learning more about Infoblox? Join our Infoblox-Certified Demo Desk for a 30-minute demo to learn how Infoblox can provide a smarter and more efficient way to manage and protect your network from the impacts on security that are arising due to evolving IT architectures. You will learn how to leverage the foundational infrastructure you already rely on every day - DNS, DHCP, and IPAM. Our presenter will also discuss how Infoblox u...
September 21, 2022
Organizer: Infoblox Government Team at Carahsoft
Location: Webcast
Add Favorite
Cybersecurity Tools and Techniques for...
"How can we implement a holistic approach to cybersecurity?" "What methodologies, policies, technologies, and specific tools can we deploy to prevent, detect and monitor cybersecurity threats"? "How can we build a more effective program?" As more data breaches are disclosed, cybersecurity is at the forefront of Boards, executives, employees and consumers. Breaches are a continuing threat to an organization's reputation through the disclosure o...
September 19-21, 2022
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
Webinar: Are Your Cybersecurity Systems...
When error-corrected quantum computers arrive, they are expected to crack today’s -public-key-based cybersecurity. But working quantum computers may be years away, so why should you worry about this now? It turns out that hackers are already amassing large quantities of encrypted data for future decryption and exploitation. In this panel discussion with National Institute of Standards and Technology’s Bill Newhouse, former Principa...
September 20, 2022
Organizer: Executive Mosaic LLC
Location: Virtual
Add Favorite
Q3 Deltek Vantagepoint Customer Town Hall
In our ongoing commitment to the Deltek customer community, please join us for the Vantagepoint Customer Town Hall of 2022. You'll hear from Deltek experts about product vision, recent releases and investments being made to advance our suite of project-based solutions.You'll learn about: What's new in Deltek Vantagepoint Upcoming releases and what you need to know Customer experience initiatives underway that enhance your experience as a customer
September 20, 2022
Organizer: Deltek
Location: Webcast
Add Favorite
How Can Schools Assure K-12 Vendors Emb...
Join the K12 Security Information eXchange (K12 SIX) and StateRAMP—a non-profit standardizing the cybersecurity risk management practices of state and local government vendors and suppliers—for a timely discussion and presentation about best practices and opportunities in K-12 vendor cyber risk management. K-12 cyber incident data compiled by K12 SIX reveals that the most significant vector for student and teacher data breaches...
September 20, 2022
Organizer: Global Resilience Federation
Location: Webcast
Add Favorite
Back to Search Begin New Search