Back to Search Begin New Search Save Search Auto-Notify
Cybersecurity Portfolio Virtual Ultimat...
Join us for the Virtual Ultimate Test Drive, where you'll get hands-on experience with Palo Alto Networks Cybersecurity Portfolio. In this free, three-hour virtual workshop, you will learn to Palo Alto Networks Security Operating Platform empowers you to confidently automate threat identification and enforcement across cloud, network and endpoints – using a data-driven approach and precise analytics. During this workshop you will: Protec...
July 20, 2022
Organizer: Palo Alto Networks
Location: Virtual
Add Favorite
Escaping Ransomware Jail: Protection Be...
Who knew that the best coffee break conversations would end up happening online? Each month, Pure’s Coffee Break series invites experts in technology and business to chat about the themes driving today’s IT agenda - much more ‘podcast’ than ‘webinar’. This is no webinar or training session—it’s a freewheeling conversation that’s as fun as it is informative and the perfect way to break up yo...
July 20, 2022
Organizer: Pure Storage
Location: Webcast
Add Favorite
Build a Technology Roadmapping Process...
Research and development (R&D) leaders cite technology development as a critical priority as they anticipate future technology needs related to new products. Technology roadmapping can help, but it is a complex and time-consuming process. This complimentary webinar will explore different approaches to technology roadmapping, the prerequisites your organization needs to start on the process, and real-life examples of how peer R&D organi...
July 20, 2022
Organizer: Gartner
Location: Webcast
Add Favorite
Security Symposium
Join the Security Symposium, where IT security professionals can learn and network with Red Hat® and Intel security experts, partners, and peers to solve security issues together as a community. The Security Symposium is a full-day event with presentations from experts and a Q&A panel with all speakers. Attendees will learn about hybrid cloud security challenges organizations face and solutions to tackle these challenges. Why attend Se...
July 20, 2022
Organizer: Red Hat
Location: Virtual
Add Favorite
Using Stacked Technology to Increase Security
Join us to learn how to increase the security of government credentials by stacking or layering different security technology: Meet some industry experts and hear about threats to credential security Understand the challenges of building a layered security effect See some real-life examples where stacking has been used for secure documents
July 20, 2022
Organizer: Entrust Corp.
Location: Webcast
Add Favorite
VMware Cloud on AWS Demo
Join us every Wednesday at 2:00pm EST for a 30 minute demo on how VMware Cloud on AWS can provide a unified infrastructure framework that bridges the gap between private and public clouds.
July 20, 2022
Organizer: VMware Government Team at Carahsoft
Location: Webcast
Add Favorite
Transformation in Action: Toronto Gives...
Learn how the city of Toronto is transforming its digital experience and service delivery for residents and businesses. On July 20, Government Technology will host municipal and industry experts to explain how Canada’s most populous city used a SaaS-based digital government payment platform to unify payment processes and service access across city departments and programs in a single pane of glass. Asim Hussain, Toronto’s director...
July 20, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
A Winning FOIA Recipe: The Ingredients...
Software isn’t the solution – it is a means to an end that involves a variety of ingredients to be successful. Those organizations that fail to see a return on their software investment are the same ones that think it will solve all their woes without doing the change management work necessary to modernize a public records response process. In this brief, 15-minute webinar, Cindi Mansell, veteran records manager, will review the in...
July 20, 2022
Organizer: Granicus
Location: Webcast
Add Favorite
NIST Customer Verification Compliance f...
NIST Customer Verification Compliance for Financial Institutions Learn how to eliminate insecure knowledge-based authenticators across online mobile AND the call center! - NIST SP 800-63 Digital Identity Guidelines See examples of 2nd factor authentication that are compliant AND accessible 2nd factors that don’t require users to enter texted codes or install software with Okta Reduce cyber-insurance costs
July 20, 2022
Organizer: Okta
Location: Virtual
Add Favorite
State, Local & Tribal: GSA Cooperative...
Under the COOP program State, Local & Tribal (SL&T) governments have access to purchase information technology, security and protection products, services, and solutions via GSA Schedules at any time, for any reason. Learn about the GSA Schedules Program and its wide array of IT commercial products and services.
July 20, 2022
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Back to Search Begin New Search