Learn about Microsoft Sentinel DoD Zero...
According to the Microsoft Digital Defense Report of 2022, the United States government network is the target of nearly half of global nation-state attacks?. The US Department of Defense released its initial Zero Trust reference architecture in 2022.The latest update provides crucial details for implementing the Zero Trust strategy, including clear guidance of 45 separate capabilities and 152 activities needed to adopt a consistent approach. V...
SLED and Healthcare Technology Workshop...
In this session, attendees learned more about the technology challenges faced by state and local agencies and the implementation of best practices for IT service delivery & infrastructure, observability, compliance and reporting. This interactive session also featured the introduction of SolarWinds® Hybrid Cloud Observability – their most compressive integrated monitoring platform for your infrastructure, network, and application...
Introduction to Synthetic Data for Comp...
In critical domains such as national security, federal asset management, and economic monitoring, the use of computer vision to extract information for decision-making and analysis is becoming increasingly urgent. The amount of video, photography, and other forms of sensor-based information being collected far outstrips our national capacity to staff and monitor data feeds with human eyes alone. Unfortunately, computer vision accuracy and perf...
Harnessing Knowvation CSP for Geospatia...
PTFS, AWS & Carahsoft hosted a webinar in the lead up to DoDIIS 2023 in efforts to explore how agencies can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Attendees of this on-demand webinar explored topics inlcuding, AI/ML Text Extraction Document Summarization Machine Learning Document Classification AWS AI/ML Image and Video Recognition The Integration of Knowvation CSP with AWS AI/ML
ThreatConnect: Threat Intelligence Webinar
During this webinar, attendees learned to understand the complexity of defending an increasingly diverse attack surface against increasingly diverse cyber threats. Also during this exclusive webinar, attendees learned what they should prioritize to make a material impact on their cybersecurity resiliency. During this on-demand webinar, our attendees learned: Details and logistics about DHS' State and Local Cybersecurity Grant Program to bolste...
Tetrate DoDIIS Webinar: Simplify Kubern...
Managing applications in Kubernetes can be complex. Tetrate’s Service Mesh makes inter-service communication, traffic control, observability and security easier. During this webinar, Tetrate discussed how the Service Mesh addresses challenges that can occur with Kubernetes, making it scalable and flexible. Tune in to this on-demand webinar for insights on: Empowering your organization with Zero Trust security through the Service Mesh Pra...
Enhancing Legal Document Management for...
Watch this complimentary on-demand webinar tailored to legal and technology professionals at government agencies as we delve into the world of legal document management. Hosted by industry leaders, NetDocuments and Element Technologies, this webinar is designed to equip you with the essential tools and knowledge to improve your agency’s legal operations. In this webinar, you will learn how you can: Ensure Mobility: Learn how mobility can...
Harnessing Compliance as Code: The Futu...
In the fast-evolving ecosystem of the Department of Defense, the way we perceive and manage compliance requirements is undergoing a paradigm shift. Compliance as Code emerges as the frontrunner to challenge traditional, manual vetting methods. Modern practices directly embed these prerequisites into infrastructure and application development processes. This offers the unique advantage of automated evidence collection, streamlining security rev...
Cyber Security Strategies and the Impor...
With cyberattacks increasing in quantity and sophistication it is becoming more important for all government entities to develop a proactive and resilient data security risk management strategy. Developing a focused approach specific to edge computing environments is increasingly important because these areas can pose the most significant levels of security risk as they are not fully encompassed by the organization’s perimeter. Watch thi...
Learn about Microsoft Sentinel DoD Zero...
According to the Microsoft Digital Defense Report of 2022, the United States government network is the target of nearly half of global nation-state attacks?. The US Department of Defense released its initial Zero Trust reference architecture in 2022.The latest update provides crucial details for implementing the Zero Trust strategy, including clear guidance of 45 separate capabilities and 152 activities needed to adopt a consistent approach. V...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.