Splunk Workshop Series
Participants joined us for a workshop series designed to enhance Splunk skill sets across their organization! Our five-part virtual workshop series covered fundamental basics, machine learning, observability, dashboard studio, and investigating fraud. Led by industry experts, these hands-on workshops empowered teams to unlock the full potential of Splunk!
Quantum Readiness: Effective Strategies...
Quantum Computers pose an existential threat to data encryption. In addition, adversaries are already capturing sensitive network traffic for Store Now, Decrypt Later (SNDL) attacks. For this reason, the Quantum Computing Cybersecurity Preparedness Act (H.R. 7535) requires federal agencies to prepare now to protect National Security Systems. Specifically, government agencies must maintain an inventory of all information technology in use that...
We Know Your Passwords (Do You?) - Free...
This on-demand webinar exposed: Shocking statistics: We dived deep into the data on password breaches and cyberattacks, revealing the true scope of the problem. Current Threats: Learned about the latest hacking techniques cybercriminals are using to bypass weak passwords and gain access to your systems. The Urgency for Change: Discovered why traditional password-based authentication is no longer enough to keep your data safe. The Solution: Ex...
Connecting the Unexpected: Scalable Dat...
Thank you for your interest in our Certus Group webinar! During this webinar, attendees learned: How Knowledge Graphs provide a scalable solution for your data structure needs The application of large language models to knowledge graph solutions The diverse use cases supported by Certus Core’s Semantic Knowledge Graph solution The importance of data governance and data standardization in scalability
Reduce Risk, Enhance Response: Ransomwa...
Every year, ransomware continues to be a persistent and evolving threat in the realm of cybersecurity. As technology advances, ransomware adapts, making it essential for state and local government to stay vigilant and implement robust security measures. The impacts of ransomware extend beyond financial losses, encompassing data breaches, reputational damage, and operational disruptions. Defending your agency against these threats requires proa...
The Future of Work for Government Agencies
Many federal, state, and local government entities are struggling to find the right strategy of hybrid work and where employees want to work with an abundance of unused or underutilized office space. For those agencies with large real estate portfolios, this balance can be further exacerbated by a lack of understanding of how the space is used across buildings, cities, and states. This begs the question: where will hybrid work go next? FM:Syst...
The Intent to Compromise: Bypassing Fir...
Today’s technology professional needs a detection system that not only blocks any indicator if their site is compromised, but also one that blocks access to malware downloads, and prevents phishing attacks. What if your system could also identify threats while in the planning stage? This is the zone where lookalike detection comes in, and it can proactively prevent attacks before they are even launched. This webinar taught how threat hun...
Securing Tomorrow: The Role of CTFs in...
Attendees of this webinar explored how Capture the Flag (CTF) events serve as a dynamic platform for fostering cybersecurity talent within universities and state/local government agencies.
AWS Georgia Public Sector Innovation Day
AWS experts are returning to Atlanta! AWS subject matter experts will discuss AWS solutions and how they can help you unleash the powers of digital transformation without disruption by harnessing the proper tools to help your agency thrive. Topics will include organizational intelligence, generative AI, modernization, security, and more.
Enhancing Unemployment Insurance Integr...
This webinar covered key aspects of Mastercard's approach to fraud prevention, including: Enhancing the accuracy of identity verification processes. Ensuring seamless access to unemployment benefits for legitimate workers. Utilizing existing data to assess the riskiness of claims more effectively. Streamlining the process to fund legitimate claims quickly. Achieving the ideal balance between security measures and accessibility for users.
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.