Back to Search Begin New Search Save Search Auto-Notify
Consolidation. Automation. Security. Ju...
Healthcare IT teams of all sizes and experience levels are tasked with enabling medical staff to provide the best possible patient care. However, efficiently supporting a wide variety of medical devices, often shared and mobile, spread across sprawling medical campuses is not easy. It's even more daunting when you consider the increase threat of cyberattacks seeking to steal lucrative patient health information (PHI) or mount a successful rans...
Add Favorite
Three Essential Steps to Unlocking Pote...
Stream AvePoint Public Sector's webinar to learn how to effectively prepare, secure, and optimize your data for the upcoming availability of Copilot in the GCC for state and local government organizations. The workshop will cover three key steps: Preparing Your Data for Copilot:Understand the relationship between Microsoft 365 content and Copilot. Improve your content's quality and relevance for effective Copilot recommendations. Securing Your...
Add Favorite
Mastering SPL with AI: Introducing the...
This webinar explored the transformative features of the Splunk AI Assistant, a generative AI-powered app designed to make SPL more accessible within the Splunk platform. This session showcased how the app facilitates the learning of SPL through natural language prompts and simplifies complex SPL commands into understandable segments. During this webinar, participants:Discovered how to use natural language prompts to generate SPL commands, mak...
Add Favorite
Staying Ahead in the Evolving Landscape...
Attendees joined us for a webinar designed to help government agencies navigate CJIS compliance and explore the latest security measures. Attendees gained insights from real-world case studies, including the City of Garland and the City of Northport, showcasing the practical implementation of TecMFA and Tectango for Police. They also discovered how these solutions streamline operations, improve data security, and contribute to CJIS compliance....
Add Favorite
Lunch and Learn on Enhancing Public Sec...
This exclusive briefing session focused on the critical issue of security debt within federal applications. Hosted by Veracode, a leading authority in software security, this event provided insights and strategies for addressing security challenges unique to the public sector. Veracode’s State of Software Security 2024 report sheds light on the pervasive issue of security debt in today’s applications, serving as a call to action fo...
Add Favorite
Securing Critical Infrastructure: Enhan...
Do you have too many Security Analysts and Engineers sitting around with nothing to do? We didn't think so; you are not alone. You may have heard how security automation can elevate your team and help move you from playing defense and reacting to incoming threats. Go on the offensive, get empowered, and get in control of your security operations to achieve your strategic goals. Splunk’s Security Orchestration, Automation, and Response (S...
Add Favorite
Maximum ACFR Automation for States, Lar...
On June 27th Workiva hosted a webinar with F.H. Black. Attendees learned why and how the largest, most complex public sector organizations are leveraging technology to drive efficiency —automating journal entries, GAAP/Closing packages, GASB 87/96/94, and reducing ACFR preparation time by 50+ percent. During this webinar, attendees:Learned why these organizations are prioritizing productivity improvement for their finance teams.Discovere...
Add Favorite
Transforming Workflows for the DoD: Ser...
Attendees joined ServiceNow as we dove into the transformative potential of integrating ServiceNow solutions seamlessly with Microsoft 365 (M365) within the secure National Security Cloud on Azure IL5. Designed specifically for the Department of Defense (DoD), this session unveiled how these powerful integrations can revolutionize your workflows, collaboration, and security measures. Attendees gained valuable insights on:Streamlined workflows:...
Add Favorite
Protect Your Organization From Ransomware
Attendees of this webinar learned about how Disaster and Ransomware Recovery is key and can be simple with VMware.We discussed how Disaster and Ransomware Recovery failures can lead to negative consequences that can majorly disrupt your business, such as:Lost worker productivityDamaged reputation Lost revenue from missed business opportunitiesPenalties related to complianceLost customer loyalty
Add Favorite
End-of-Life IT & Spilled Data Raises Br...
Join Carahsoft and Blancco and hear how to redeploy government computer drives, assets, devices, and other hardware to lower costs and provide increased value to federal agencies. During this session, Eddie Prothero and David Robinson addressed some events that require sanitization:Hardware refreshesRecords retention expirationsContract or project completionsOverseas or emergency military movementsStaff changesData migrations
Add Favorite
Back to Search Begin New Search