Understanding the Quantum Cybersecurity...
The quantum computing threat is a clear and imminent danger, having the potential to completely disrupt all secured data, information systems and infrastructure. As we enter the quantum computing era, adopting a post-quantum crypto-agile encryption posture should be one of the top priorities agencies adopt and employ to fortify their proactive stance in cybersecurity. During this webinar, attendees learned about quantum computing power and the...
Navigating OT Security in the DoD
Attendees of this webinar gained insights on: Current threats that result from converged IT/OT operations Recent OT security legislation and impacts on the DoD The unique use cases for OT security in the DoD Tips and mitigation strategies for managing OT security threats
Mapping to DoD Zero Trust Capabilities:...
In this on-demand webinar, attendees learned: How to meet Network, Orchestration/Automation and Visibility/Analytics requirements How to manage encrypted data The importance of Lateral or East-West visibility in Zero Trust
Navigating Cloud Security in a Rapidly...
In today's rapidly evolving digital landscape, organizations are increasingly turning to cloud technologies to gain unparalleled advantages in agility, elasticity, and innovation. While traditional cloud adoption primarily focused on offloading the burden of infrastructure management, cloud use-cases have evolved. The unique confluence of Palo Alto Networks Prisma Cloud, the HashiCorp suite of infrastructure automation tools, and Amazon Web Se...
Better Together: Building a Zero Trust...
Managing data efficiently is becoming more complex and it's crucial to keep up with regulations. Elastic and Cribl work together to make data management easier for public sector organizations. Together the pair are bringing better data integration, analytics and observability to the table, so agencies can make smarter decisions and deliver better services. Attendees tuned in live on April 16 to learn how the Cribl product suite integrates with...
Discover the Difference: Adobe Connect...
Watch this on-demand webinar to explore the vast possibilities of Adobe Connect with Alistair Lee and Peter Ryce, industry leaders with a wealth of experience in eLearning, webinars, and customer engagement. You will discover how to create a visually stunning and branded virtual space, captivate your audience from the start, and leverage the full range of interactive tools to drive engagement. Lastly, you will uncover the secrets of extending...
Empowering Statewide Policing through D...
The Maryland State Police is one of the largest agencies utilizing Tableau for data-driven policing on a state level. Attendees of this enlightening webinar received an in-depth Q&A with the agency's Tableau Solutions Architect, Christopher Corea. With 22 years of law enforcement experience and retiring from the agency as a First Sergeant, he is now responsible for creating the Maryland State Police Tableau Center of Excellence and managin...
Integrated Eligibility: Achieve Complia...
Public Sector is challenged with the most complex regulations, policies, and legal framework within a multitude of business processes, including: Eligibility & enrollment Care & claims management Financial management Celonis acts as a policy tailwind, supporting compliant public health programs and improving processes and KPIs.During this webinar, in partnership with IBM, attendees discovered how Celonis can elevate control over the mo...
EV Charging Summit
ChargePoint is the leader in EVSE solutions for federal, state and local governments and commercial/fleet applications. ChargePoint’s solutions help organizations track and report sustainability metrics through our leading charging network that includes an integrated portfolio of hardware, cloud services and support. These solutions give station managers the ability to easily monitor fleets’ energy usage in real time, set a power c...
Comprehensive Disaster Recovery Reduces...
During this webinar, subject matter experts discussed:Cohesity's AI-Powered Data Security for K12: Ransomware Immutable Backups ensure K12 schools combat threats effectively, meeting industry guidelines. Swift restoration and trustworthy environments are guaranteed.Predictable Pricing and Network Recovery: Stage2Data's disaster recovery model ensures stable costs, allowing organizations to focus on recovery efforts with transparent expenses. E...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.