Back to Search Begin New Search Save Search Auto-Notify
How Infoblox Supports Public Sector Networks
During our 30 minute demo Infoblox-Certified Demo Jock, attendees learned how Infoblox can provide a smarter and more efficient way to manage and protect their network. Our presenter discussed:The impacts on security that arise from evolving IT architecturesHow to leverage your current foundational infrastructures, including DNS, DHCP, and IPAMAdvantages of actionable network intelligence that provides valuable insights on threats and incident...
Add Favorite
Evolving Talent Management to Build the...
The skills needed within the federal workforce are evolving, and the way we recruit, train, and support employees must change to support workforce and mission needs. Attendees joined us for a discussion on how to successfully support skills-based hiring and employee career growth by using ServiceNow to capture and maintain skills for re-skilling and up-skilling. The conversation started with ServiceNow experts discussing today’s ever-cha...
Add Favorite
SAS Viya on Red Hat OpenShift: Analytic...
Red Hat and SAS hosted a webinar on Thursday, August 22nd, for insights on how their integrated solution helps enterprise IT organizations build and scale analytics on a stable infrastructure and operationalize analytics to get models into production quickly.For more information on Red Hat & SAS's collaboration, please view the resources below:Solutions Brief: Analytics in the Hybrid CloudWebsite: Trusted Decisions With SAS Viya on Red Hat...
Add Favorite
Cryptography Simplified: Addressing the...
Cryptography is everywhere. As a key security control that enables privacy, security, and trust in our digital world, it is highly regulated. Yet, after years of being a somewhat sleepy topic in the cybersecurity world, cryptography is now a hot topic in the Public Sector for at least two reasons. First, ongoing migration from FIPS 140-2 to FIPS 140-3 is generating waves of activity to comply with the new NIST standard. As an even larger chall...
Add Favorite
GovCon - Summer Shorts - M&A
COMPLIMENTARY + RECORDED WEBINAR SERIES Join Jennifer Schaus & Associates in this 2 WEEK Special Webinar Series, 2024. Guest Speakers will cover various topics in federal contracting and touch on three main areas:Best Practices - Avoiding Pitfalls - FAQ's - and then take your live questions. COMPLIMENTARY & RECORDED WEBINAR SERIES Tell a friend or colleague!
Add Favorite
Securing the Gateway: Mastering API Sec...
In this session, MuleSoft discussed the importance of securing APIs and shared practical tips and strategies for keeping your APIs safe from cyber threats. Attendees gained insights into industry-leading practices and recommendations to safeguard their APIs from unauthorized access and other potential risks to securely scale their API catalog through standardization, community, and monitoring. watch the on-demand recording to learn about ways...
Add Favorite
Value Streams in the Atlassian Ecosystem
Process inefficiencies and communication barriers hinder government agencies from delivering effective public services. As data complexity increases, visibility delays will only worsen. In Atlassian's webinar on August 27th audiences discovered possible delays in their workflows by exploring topics such as:Enhancing operational efficiency with data integrationData security and privacy in public sector analyticsBest suited tools to streamline w...
Add Favorite
A Proactive Approach to Defend Your Endpoints
90% of organizations experienced at least one identity-related security incident in the past year. Attackers are increasingly targeting identities and exploiting privileged access to gain a strong position in your environment, bypassing the work of EDR and traditional endpoint defenses. How can security teams take a proactive approach to defending their endpoints? Watch the on-demand recording for a Tech Talk and Live Demo to learn why managin...
Add Favorite
Extending Microsoft Collaboration ABAC...
The defense industrial base (DIB) must meet the critical controls laid out CMMC, NIST, DFARS and other government mandates to bid on defense contracts and protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). Watch this on-demand webinar as we explore how extending a Zero Trust approach to file access and sharing using archTIS’s NC Protect helps to ensure compliance with various standards for secure ac...
Add Favorite
AWS Cloud Practitioner Boot Camp
During this virtual boot camp, subject matter experts reviewed:What the AWS Cloud Platform is and the global infrastructure it providesBasic AWS Cloud architectural principlesThe AWS Cloud value propositionKey services on the AWS platform and their common use casesBasic security and compliance aspects of the AWS platform and the Shared Responsibility ModelThe billing, account management, and pricing modelsSources of documentation or technical...
Add Favorite
Back to Search Begin New Search