Back to Search Begin New Search Save Search Auto-Notify
Election Integrity in the Digital Age:...
Do you have too many Security Analysts and Engineers sitting around with nothing to do? We didn't think so; you are not alone. You may have heard how security automation can elevate your team and help move you from playing defense and reacting to incoming threats. Go on the offensive, get empowered, and get in control of your security operations to achieve your strategic goals. Splunk’s Security Orchestration, Automation, and Response (S...
Add Favorite
GE3 | Government Experience, Engagement...
Discover the latest innovations from government leaders and industry experts. The GE3 seminar for government professionals focused on Experience, Engagement, and Enrollment, the three Es of engaging stakeholders and audiences, building subscribers, driving adoption, and enrolling customers in benefits programs. The summit takes a deep dive into the elements of creating and successfully engaging a community — technologically, analytically...
Add Favorite
Data Readiness for AI: Unlocking Potent...
In this webinar, we dove into the critical first steps organizations must take to prepare their data landscape for the transformative power of AI. We explored proven strategies for overcoming the common challenges of accessing, cleansing, and consolidating data to ensure AI initiatives are built on a solid foundation of quality data.During this webinar, our MuleSoft speakers discussed:AI Taxonomy: Discover how to categorize AI concepts and top...
Add Favorite
Google Workspace California Webinar Series
In this webinar series, we covered the following topics and more:Google Workspace for GovernmentHow Google Does SecurityGenAI - Realistic ways to make it work for you
Add Favorite
Uncover Criminal Activity Without Waiti...
Criminal and terrorist activity is not just on the rise, it's leveling up. While illicit actors use the blockchain to finance their activities, they plan their operations on the deep and dark web. Is your organization still depending on teams of analysts to uncover these threats?Cloudburst leverages AI to crawl out across multiple platforms, providing foresight and investigative capabilities, identifying and tagging activities in real-time. Jo...
Add Favorite
Defending the Public Sector
Generative AI is empowering bad actors and giving them a new method to attack your business, data and citizens. Account takeovers (ATO) are estimated to have caused $635 billion in global losses in 2023. GenAI will increase both the volume and severity of future ATO attacks and make them harder to detect and defeat. Fraudsters are now actively targeting call centers using GenAI to turbocharge established fraud MOs, such as impersonation and so...
Add Favorite
Tableau Enablement Series Part 7 - Make...
The modern data analyst is tasked with generating insights from data, but not all the necessary fields are always present in the dataset. During this webinar, attendees were able to review foundational Tableau concepts such as:Calculated FieldsAggregation OptionsTable CalculationsLevel of Detail CalculationsOrder of Operations
Add Favorite
Don't Let Your Healthcare Help Desk Bec...
View this on-demand webinar from RSA and Carahsoft where we dive into protecting your healthcare organization's IT help desk from cyberattacks.Attendees learned:Why healthcare help desks are such a lucrative target for cybercriminals.The potential consequences of a successful attack on your help desk.How to leverage identity governance, process automation, and a defense-in-depth approach to fortify your defenses.Actionable steps you can take t...
Add Favorite
Next-Gen Search Mastery for PubSec: Ela...
Struggling to navigate the vast data landscape of your organization? Traditional search methods can't keep up with the complexity and volume of modern data. Discover the transformative power of Elastic's Vector Database. During this Elastic webinar experts dived into how AI-driven search delivers unparalleled relevance and speed, turning data into actionable insights for enhanced citizen engagement and rapid security threat analysis. Vector da...
Add Favorite
Veritas & Everfox: Secure Cross Domain...
Data is the lifeblood of your organization. If something were to happen to it, especially when it is vulnerable during large transfers, the damage could be disastrous. To minimize this risk, Veritas and Everfox have come together to offer a joint-solution: Cross Domain data backup that meets Raise The Bar guidelines. Attendees joined our Carahsoft demo team for a display of this interaction, learned how their organization can incorporate these...
Add Favorite
Back to Search Begin New Search