Back to Search Begin New Search Save Search Auto-Notify
Enhancing Legal Document Management for...
Watch this complimentary on-demand webinar tailored to legal and technology professionals at government agencies as we delve into the world of legal document management. Hosted by industry leaders, NetDocuments and Element Technologies, this webinar is designed to equip you with the essential tools and knowledge to improve your agency’s legal operations. In this webinar, you will learn how you can: Ensure Mobility: Learn how mobility can...
Add Favorite
Harnessing Compliance as Code: The Futu...
In the fast-evolving ecosystem of the Department of Defense, the way we perceive and manage compliance requirements is undergoing a paradigm shift. Compliance as Code emerges as the frontrunner to challenge traditional, manual vetting methods. Modern practices directly embed these prerequisites into infrastructure and application development processes. This offers the unique advantage of automated evidence collection, streamlining security rev...
Add Favorite
Cyber Security Strategies and the Impor...
With cyberattacks increasing in quantity and sophistication it is becoming more important for all government entities to develop a proactive and resilient data security risk management strategy. Developing a focused approach specific to edge computing environments is increasingly important because these areas can pose the most significant levels of security risk as they are not fully encompassed by the organization’s perimeter. Watch thi...
Add Favorite
Learn about Microsoft Sentinel DoD Zero...
According to the Microsoft Digital Defense Report of 2022, the United States government network is the target of nearly half of global nation-state attacks?. The US Department of Defense released its initial Zero Trust reference architecture in 2022.The latest update provides crucial details for implementing the Zero Trust strategy, including clear guidance of 45 separate capabilities and 152 activities needed to adopt a consistent approach. V...
Add Favorite
Navigating the MFA Myth Maze: Strengthe...
During this webinar, viewers explored the evolving landscape of Multi-Factor Authentication (MFA) and its importance in securing online accounts. It highlighted common myths regarding what constitutes a secure MFA solution and also exposed vulnerabilities in MFA, emphasizing the need to re-evaluate security measures. This discussion covered various MFA methods, their strengths, and potential vulnerabilities, such as phishing, weak passwords, a...
Add Favorite
Managing the Tidal Wave of Digital Evidence
The size of the digital data universe is doubling every two years, and police investigation is no exception in this trend. Technological innovations like body-worn cameras, license plate readers, in-car cameras, surveillance cameras, gunshot detection, drones, internet-connected devices, cell phones, social media, and more are creating a tidal wave of digital evidence. All of these manual activities waste time that your investigators could be...
Add Favorite
Kofax and InfoCap: Intelligent Process...
Government and Commercial organizations are burdened with multiple-data and documentation sources. InfoCap leverages the disciplines and technologies of data and document centric business processes into an Intelligent Process Automation platform (IPA) for business process automation, omni-channel document capture, and robotic-process automation leveraging Kofax Total Agility (KTA) software. InfoCap delivers innovative digital workforce solutio...
Add Favorite
Harness Data & Artificial Intelligence...
At the recent webinar with BJSS, AWS & Carahsoft, attendees learned from our experts about their greatest challenges and success stories with using AI to transform their public services, Attendees of this on-demand webinar learned: Strategies to harness data and AI, transforming citizen experiences and reducing access barriers. How to overcome digital transformation obstacles and discuss success definitions, data privacy, security and crea...
Add Favorite
DoD Modernization Through Automation: L...
Attendees learnded how to harness the power of Red Hat automation and Linux technologies to drive modernization efforts within the U.S. Army Corps of Engineers (USACE). These powerful tools can not only automate routine tasks but also enforce the security standards mandated by the Defense Information Systems Agency (DISA). This hands-on on-demand training provided the ability to enhance security posture while streamlining operational processes...
Add Favorite
Demo: Tenable Operational Technology Security
This on-demand demo showcased how Tenable OT Security delivers complete visibility into an organization’s converged IT/OT infrastructure to help maximize the safety and security of your OT environment. Our Tenable OT Demo covered the following: Comprehensive visibility across converged IT/OT operations. Risk reduction through multiple threat detection methodologies. IT and OT asset identification and monitoring with Tenable OT Security....
Add Favorite
Back to Search Begin New Search