Back to Search Begin New Search Save Search Auto-Notify
Creating a Virtual Learning Environment...
In the ever-evolving realm of virtual training, crafting an immersive and enduring learning experience necessitates a nuanced strategy coupled with the utilization of cutting-edge tools. As technology continues to reshape the way we engage with education and professional development, the significance of adapting to these changes becomes paramount. Watch our on-demand webinar where Erika Jacobs, a distinguished USMC Instructional Specialist, wi...
Add Favorite
Tableau 2024 Kick-off Webinar
This webinar gave attendees the opportunity to grow and enrich their data skills by connecting with their Tableau Team and fellow Tableau Users. Attendees were able to learn what’s new with Tableau and events to look forward to in the coming months. During this on-demand webinar, attendees were able to: Learn & grow - Discover the new features of Tableau 2023.3 and learn how those new features can take reporting to the next level Be...
Add Favorite
Future-Proofing Aerospace & Satellite C...
Amid a backdrop of escalating cyber threats within the aerospace & satellite (A&S) industry, and with federal agencies like the U.S. Space Force, NASA, and the Intelligence Community deepening ties within the supply chain, cybersecurity compliance has emerged as a linchpin for success. As the Space Force unveils its largest budget yet at $30 billion for FY24, the urgency for A&S vendors to align with federal cybersecurity standards...
Add Favorite
Adopting Least Privilege Principles to...
Endpoint security serves as the frontline defense in protecting your organization's network from a wide array of threats originating from devices that connect to the enterprise network, such as laptops, smartphones, and tablets. These endpoints are often the targets of cyberattacks as they provide access points to the organizational network, making them vulnerable to malware, ransomware, phishing, and other sophisticated attacks. By securing t...
Add Favorite
2024: FAR Part 10, Market Research
Join Washington DC based, Jennifer Schaus & Associates in the 2024 Webinar Series covering The FAR, Federal Acquisition Regulations. This series features guest speakers who will uncover the important details and nuances of The FAR. Get educated about the rules and regulations in the game of federal contracting. This series is COMPLIMENTARY & RECORDED. Recordings are posted on our YouTube Channel. CORPORATE SPONSORSHIPS of this Webinar...
Add Favorite
F5 Distributed Cloud Webinar: F5 Federa...
Federal agencies face many challenges in the form of security-related mandates and moving applications to the cloud, such as FIPS and OMB M-21-31. As these requirements become reality, administrators addressing these technical hurdles increasingly find themselves augmenting cybersecurity and application delivery tools leading to tool sprawl. During this on-demand webinar, attendees learned how F5 can help address these requirements while prov...
Add Favorite
Mastering Data and File Sharing at the Edge
In this webinar, we discussed how to:Master safeguarding data integrity, privacy, and security in a decentralized data landscape.Establish cyber-resilient edge infrastructures to combat rapid data generation and device proliferation effectively.Discover a file system that enables global, real-time, secure data access, fostering efficient collaboration among mission stakeholders.Leverage a global file system for enhanced cyber resilience and se...
Add Favorite
Tame Your Agency's Data Chaos
During this webinar SAP NS2 went over how modernizing data platforms is essential for agencies. By providing your agency with up-to-date infrastructure and solutions, you enable it to consistently deliver the comprehensive insights necessary for mission success. Join SAP NS2 as they support you and your agency throughout the modernization process. During this on-demand webinar, our expert speaker covered: Migrating from legacy operating system...
Add Favorite
Year of the Dragon? Using OSINT for a D...
Understanding and tracking the multifaceted influence of nations is crucial for maintaining a strategic advantage. China is systematically influencing instruments of national power, encompassing diplomatic, information, military, and economic (DIME) spheres. Against the backdrop of the year of the dragon — symbolizing strength, wisdom, and transformation — this program will delve into how open-source intelligence (OSINT) can empowe...
Add Favorite
WEST 2024 Webinar Series: Fortifying th...
AFCEA WEST 2024 Webinar Series: Anjuna: Fortifying the Digital Frontlines: Confidential Computing for National Security Anjuna and Carahsoft are excited to invite you to join us subsequent to WEST 2024 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Attendees of this webinar learned: The importance of confidential computing Common use cases for customers of Anj...
Add Favorite
Back to Search Begin New Search