Back to Search Begin New Search Save Search Auto-Notify
It's Not the Breach. It's the Spread: I...
This session explored the critical role of cyber resiliency in helping organizations withstand and recover from today's evolving threats. We dove into strategies for reducing attack surfaces, visualizing networks, and securing critical IT assets while also examining how compliance regulations can enhance security and safeguard sensitive data. During this webinar, attendees:Learn how to minimize vulnerabilitiesGain actionable insights to streng...
Add Favorite
Data Flywheels in Defense: Faster Model...
This webinar covered how data flywheels and iterative pipelines help defense organizations reduce training time, manage large volumes of multi-modal data and maintain accuracy with domain experts in the loop. During this webinar, attendees learned to:Accelerate iteration cycles for continuous model improvementScale pipelines to handle unstructured, multi-modal defense dataIntegrate domain experts for in-the-loop validation and reliable perform...
Add Favorite
From Months to Days: GPU-Accelerated Ar...
Emerging threats like drones and drone swarms are transforming today’s battlefield. Traditional development cycles for weapons and armored vehicles—which often take years of prototypes, subsystem tests, and full product qualifications—can’t keep up, leaving warfighters exposed. In this on-demand webinar we explore how advanced ballistics engineering simulation is speeding the development, qualification, and deployment o...
Add Favorite
How Will Your Indirect Cost Hold-up to...
This FREE webinar will offer attendees an overview of the current risks associated with indirect costs charged to federal government contracts. With recent changes and increased scrutiny on contract spending, it's crucial for contractors to understand how to effectively manage and justify their indirect costs. Our experts will guide attendees through the complexities of this evolving landscape, offering insights and strategies to safeguard the...
Add Favorite
OT Security for Tribal Governments: Pro...
Tribal governments oversee a diverse mix of critical systems — from water treatment plants and healthcare facilities to casinos and education networks. This unique combination makes them an ideal target for cybercriminals because they face tight budgets, limited cybersecurity resources, and high visibility within their communities. Even small attacks can cause significant disruption and gain unwanted publicity. Attendees joined us to lea...
Add Favorite
Five Unhealthy Mistakes to Avoid When A...
Topics covered in this webinar:Neglecting a Formal Archiving StrategyMerging Patient DataCreating Mini EHRsStaying Loyal to your Original LDA VendorArchiving With the Incumbent EHR
Add Favorite
One Portal, Many Missions: Simplifying...
In this webinar, attendees learned how Jira Service Management helps federal agencies overcome the challenges of multiple portals, complex workflows and manual processes that slow response times and drive up costs.The session explored how to:Consolidate service requests into a single, user-friendly portalAutomate routing and reduce manual processesStrengthen compliance while cutting costsEmpower teams to focus on mission success instead of adm...
Add Favorite
Modernizing Federal PPBE: Connecting St...
Today, the Planning, Programming, Budgeting, and Execution (PPB&E) process faces challenges of complexity, fragmented data, and the need for cross-agency alignment. In this session, ServiceNow experts demonstrated how Strategic Portfolio Management (SPM) helps the Department of Defense modernize PPB&E execution by providing visibility into program requests and investments, supporting collaborative planning across stakeholders, aligning...
Add Favorite
Operation Missionforce Control: The Dig...
Managing a Federally Funded Research and Development Center is one of the most complex leadership challenges in the nation. DOE labs like Los Alamos face mounting pressure to deliver on national security missions while navigating outdated systems and disconnected data. This “flying blind” approach risks delays, overruns, and safety incidents that threaten performance-based fees and core objectives. Attendees explored a proven model...
Add Favorite
Voice Security in the Public Sector: De...
The voice channel is the most under-protected entry point into public sector organizations, and attackers know it. From AI-powered vishing and social engineering to spoofed calls, robocalls, and voice spam storms, adversaries are weaponizing telephony to bypass traditional defenses and compromise sensitive data. During this exclusive webinar, hear from experts who will expose the current voice threat landscape, reveal attack tactics and trends...
Add Favorite
Back to Search Begin New Search