Transforming Citizen Service: How Publi...
Our Citizen Request Management solution, built on the Salesforce platform, is specifically designed to address the challenges faced by modern Citizen Request Agencies. This solution is not only user-friendly and flexible but also highly adaptable, allowing it to meet the evolving demands of public service. Most importantly, it is a turnkey solution, ready to deploy with minimal configuration or customization required. During this webinar, atte...
Stay Compliant with the CJIS Security Policy
The FBI Criminal Justice Information Services (CJIS) Security Policy sets the baseline security standards that both criminal justice and noncriminal justice agencies must adhere to in order to access and safeguard criminal justice information. The clock is ticking to meet these CJIS compliance standards! Failing to comply can lead to serious consequences, including legal penalties, data loss, and reputational damage.CyberArk, the global leader...
Autonomous Pentesting In-House: A Game...
Attendees joined us to learn how Horizon3.ai software (NodeZero) is changing the paradigm of annual pentesting and vulnerability scanning into a truly manageable, exploitability focused model. Enabling cybersecurity teams in leading higher education to answer the most fundamental question in cyber on a consistent basis; Are we secure today? Have we addressed our most critical security weaknesses before they can be exploited by attackers; as ph...
XD Vision: The Future of Multi-Domain A...
Attendees joined this webinar for an exclusive unveiling of XD Vision, the next-generation cross domain solution (CDS) from Owl Cyber Defense. Soon to be certified and approved for deployment, XD Vision is the world’s first and only CDS designed for secure, multi-domain audio (VoIP) and video (VTC & FMV) collaboration. XD Vision combines RTB-compliant security with an elegant, user-friendly interface, empowering operators and command...
Outpacing the Digital Threat with Endpo...
Attendees of this webinar gained insight on Ivanti's Endpoint and Patch Management strategies. Key discussion points included:DISA Enterprise Patch Management System overviewManage any device and use cases (Windows, Linux, MacOS, ChromeOS, Android, and iOS)Outpacing strategies for the increase of Information Assurance Vulnerability alerts and CVEs
Google Public Sector AI Webinar
During this webinar, we explored the following:Traffic congestion causing major delays? In 2023, the median train length was 5,300 feet, leading to significant traffic delays, sometimes as long as 4 hours if stopped. This has serious consequences for emergency response times, resident commutes, and local commerce.Learn how San Marcos is leveraging AI for a solution! This webinar will showcase a new AI-powered train detection system that provid...
IPv6 Workshop Series: Configuring Infob...
In this technical session, the second of a three-part virtual workshop series, Hexabuild’s Tom Coffeen demonstrated the configuration of IPv6 Address Management on an Infoblox system. He used a fictional IPv6 address plan that includes some IPv6 address planning best practices. Key Learning Objectives:Configure IPv6 networks within the data management functionality of NIOS IPAMUnderstand some IPv6 address planning best practicesBuild-out...
Federal Low-Code App Engine Innovation...
This Low-Code App Engine Innovation Workshop showed how organizations are re-imagining their approach to automation and app development with ServiceNow's Creator Workflows. Attendees learned how to boost productivity at scale by building high-value low-code mission apps with App Engine. Whether you're a pro developer of any level looking to streamline repetitive tasks, a low-code business analyst looking for ways to solve unique mission challe...
Analytics Everywhere: Next-Gen Strategi...
We invited attendees to discover advanced techniques for better addressing their users' needs and enhancing their experience. In this webinar, we explored cutting-edge strategies for distributing analytics, including pushing insights directly into business systems, leveraging collaboration tools, and creating custom-built experiences. Attendees learned how to leverage Tableau Pulse's data API and other innovative approaches to make data-driven...
Gain Full Visibility and Meet Zero Trus...
Attacks on identities, especially privileged identities, are at an all-time high. Yet agencies are challenged with securing significantly more privileged accounts and supporting vastly larger decentralized networks than in years past. Organizations need a higher degree of privileged access protection. A zero-trust architecture (ZTA) addresses modern identity security challenges by enforcing granular, secure, authorized access. Tools like Beyon...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.