Leveraging Technology for Regulatory Ex...
Join Gov2Biz, AWS and Carahsoft for an engaging webinar on the transformative role of technology in alcohol regulation. General Bentley Nettles, former Executive Director of the Texas Alcoholic Beverage Commission, shares the success story of Alcohol Industry Management System (AIMS). AIMS replaced 18 legacy systems, resulting in a remarkable increase in license issuance speed. Discover how state government agencies can effectively leverage t...
How Tanzu Can Help Developers Go Fast Forever
VMware Tanzu Lab de-risks mission-critical software development by helping you write applications and features that delight users and accelerate mission outcomes. We can help you write great applications using proven practices and cloud native principles. Best of all, our collaborative approach allows for the transfer of modern development skills to your team, enabling you to continue building awesome software after our engagement ends. In oth...
VMware Arizona Day
In this on-demand webinar, VMware subject-matter experts discussed VMware solutions and how they can benefit you and your organization. View the topics covered below: Agenda:8:00am - 9:00am: Registration/Breakfast9:00am - 9:15am: Opening Session - Jim Falvey, Sr. Sales Director - Public Sector, VMware9:15am - 10:00am: Security Mindset - Christopher McCain, Sr. Technology Director - Networking and Security, VMware10:00am - 10:45am: Ransomware...
Establishing Boundaries in Today's Data...
Attendees of this on-demand webinar explored the intricacies of establishing and managing boundaries within data centers and IT infrastructure, which is crucial in the era of Zero Trust.
F5 Red Hat Tech on Tap
APIs are the lifeblood of the internet today. Everything from booking flights to reading your daily newsfeeds is all made possible by the growth of data sharing using Application Programming Interfaces (APIs). With the growth of modern applications, developers often unintentionally leak sensitive datasets. The proliferation of APIs has marked them as a prime target for malicious actors and nation-states leaving the DoD and the War Fighter vuln...
Solving Investigations with Social Media Data
With new data sources popping up every day, investigators need to constantly evolve to keep up with new data in their investigations. However, with the overwhelming amounts of new data, it's become increasingly difficult for investigators to sort through and link all the individual data points. Watch this on-demand webinar to learn from OSINT expert, Nico Dekens, who provides a detailed account of his experience using social media data and OSI...
Empowering Public Safety Agencies with...
Public safety agencies face the formidable challenge of efficiently analyzing and leveraging extensive volumes of data. With the ever-increasing complexity and quantity of information available, these agencies require a robust solution to effectively harness the potential of their data resources. This on-demand webinar explored how Tableau has emerged as an invaluable tool that equips public safety agencies with the capabilities to unlock hidd...
Introduction to Advanced Analytics with...
Join Alteryx for an interactive session on conducting end-to-end analysis. To start off, we will unpack how federal, state, and local agencies are utilizing data driven approaches to enhance their operations, including reconciliation, risk assessment, and data deduplication. After a brief introduction to the possibilities, you'll go hands-on and learn how to apply these techniques for yourself. You will learn how to bring in and merge differe...
DevSecOps: A Shift Left for Security an...
The success of federal agencies hinges on modernization. As such, a growing number of government programs are adopting DevSecOps methodologies but struggle to harness its full potential. With Atlassian's Jira Software and Confluence, agencies can make the most of their adoption by streamlining workflows and boosting agility. Join Atlassian experts on November 15th to explore: Use cases on federal agencies modernizing their systems using A...
Leveraging Delinea Server PAM for Smart...
Smart cards provide an enhanced level of security for Linux computers when users log on to Active Directory domains. If you use a smart card to log on, authentication requires a valid and trusted root certificate or intermediate root certificate that can be validated by a known and trusted certification authority (CA). Because smart cards rely on a public-private key infrastructure (PKI) to sign and encrypt certificates and validate that the c...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.