Turning Technological Advantage Into Ba...
The spotlight is on artificial intelligence (AI) and its role in shaping the future of defense strategy and operations. In this session, you’ll hear from Igor Jablokov, CEO and founder of Pryon and the AI visionary whose previous venture became the foundation for Amazon’s Alexa. Igor and his team at Pryon have been at the forefront of AI innovation, advocating for responsible AI development and pioneering secure AI deployments to s...
Build Your Virtualization Transformatio...
Government organizations may face several challenges with virtualization, including complex cloud implementation, speed and security of virtualization, and inefficiencies with existing IT infrastructure. Oracle Linux Virtualization addresses these concerns by ensuring the virtualization process is simple, secure, and supportive.Watch the on-demand webinar and discover how Oracle Linux Virtualization helps your agency accelerate its cloud devel...
Finding Zero Trust to Alternatives to R...
Are aging VPNs still relevant in your long-term network strategy? VPNs are plagued by vulnerabilities and regularly exploited by attackers. Their network-centric design backhauls traffic and allows for lateral movement by putting users directly on the network. During this webinar, a panel of experts discussed the challenges of connecting employees and third parties to private applications using traditional VPNs, explored why fully remote and h...
NYU Transforms Business with Enterprise...
In this webinar, key takeaways were:Understanding the challenges of managing multiple data warehousesThe benefits of adopting an enterprise-scale data architecturePractical steps to implement a data vaultLessons learned from NYU's journey
Turning Real-Time Data Into Action for...
Attendees joined us and learned how real-time data analysis can help institutions gain fuller insights into cybersecurity posture, IT and HPC systems operations, public safety and student well-being. Attendees also explored sustainability and Wi-Fi optimizations use cases. For example, real-time data can enable risk-based alerting, so staffers are not overwhelmed with security alerts that aren’t important. In addition, many institutions...
Red Hat OpenShift Virtualization Workshop
This workshop was tailored for VM administrators and infrastructure architects looking to explore new virtualization solutions. Attendees gained hands-on experience with OpenShift Virtualization, diving into key concepts such as importing, networking and storage.
Revolutionizing Cybersecurity for Feder...
Government agencies handle an extensive amount of sensitive data and Controlled Unclassified Information (CUI) that must be diligently managed and protected. Isolated cloud environments, known as GovClouds, help these US government agencies, contractors, and other organizations meet their regulatory and compliance requirements when running sensitive workloads in the cloud. Zscaler is a long-time partner with the government to secure IT moderni...
Learn How Jira Service Management Impro...
Government employees deserve tools to simplify their work and improve citizen satisfaction. Discover how Atlassian's Jira Service Management (JSM) can transform the way state and local government agencies deliver services.This Atlassian webinar hosted on September 19th explored how to: Improve citizen experience by simplifying service requests and incident trackingDecrease response times and improve resolution ratesEnhance transparency and acc...
Smartsheet Gov Dynamic View Webinar
Smartsheet Gov, Prime Consulting Group, and Carahsoft hosted a webinar on how to use Dynamic View in your solutions to allow your Vendors and External Collaborators access to the information they need but not see the information they shouldn't. Customer were taught how to begin integrating the collection of external information into your organization's workflows in a seamless and secure manner. In this webinar, James Green shared a real use ca...
Accelerating Investigations and Increas...
One of the main goals of law enforcement agencies is to catch and prosecute those who have committed crimes of any sort. After all the evidence of a crime has been collected for review, the real hard work begins as investigators begin to sift through the mounds of physical and digital evidence. As they do this, they try to search and locate key artifacts that will assist them in identifying the suspect(s), the motive(s), and any other critical...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.