Unlock the Power of Splunk ES and RBA i...
During this webinar, we demonstrated how you can overcome common challenges that customers struggle with when operationalizing Splunk Enterprise Security and Risk Based Alerting. Whether you are a new ES customer, or you’ve had ES for years, this webinar showed you how to quickly unlock the powerful features contained in Splunk ES. We presented a demo of Outpost Security's Splunk App - Zero-to-One. This is a premium Splunk App available...
Cyber-Informed Engineering for OT Secur...
Attendees joined us for a webinar focused around IT/OT integration for AVEVA PI users. Cyber-Informed Engineering (CIE) is emerging as the most useful change in perspective in Operational Technology (OT) security in a decade. CIE represents a shift in OT security, offering a dual-sided approach. On one side, it educates engineers about cyber threats and mitigation strategies. On the other, it leverages powerful safety, protection and network e...
Unlocking Intel's AI Ecosystem: From PC...
This webinar, hosted by Intel and Carahsoft, will cover Intel's Data Center GPU Flex Series. It offered a versatile GPU solution for the visual clouds and supports various workloads This included media streaming, AI Inference, and virtual desktop infrastructure, with a focus on reliability and scalability.
Streamlining Supervision: Using Mobile...
Probation and Parole officers often face time-sensitive situations requiring quick mobile device examinations. However, managing these devices effectively can be challenging without the right tools and training. Access the on-demand recording to join ADF Solutions as they delve into practical insights and best practices to help you navigate the complexities of mobile device investigations for Probation and Parole. Specifically, you will learn...
Splunk Workshop Series
Participants joined us for a workshop series designed to enhance Splunk skill sets across their organization! Our five-part virtual workshop series covered fundamental basics, machine learning, observability, dashboard studio, and investigating fraud. Led by industry experts, these hands-on workshops empowered teams to unlock the full potential of Splunk!
Empowering Families: A New Era of Preve...
Attendees learned how Philadelphia's Philly Families CAN initiative revolutionized referral and case management for at-risk families using eNoble's Noble Child app on Salesforce. The webinar unveiled the strategic approach to automating referrals, streamlining eligibility assessments, and fostering collaboration among service providers. Key discussion points included: The power of automated intake and eligibility determination to rapidly conne...
How AI Will Transform Higher Education...
In this webinar, attendees learned about how the AI-driven smart campuses of the future will look. We examined how universities are leveraging AI to transform operations and the student experience. Viewers also gained insights about how forward-thinking institutions are accelerating digital transformation to better prepare for the future of higher education supported by AI.
New Zero Trust Endpoint Technology for...
Attendees gained an understanding of the differences between traditional zero clients, thin clients, and the new Trusted Zero Clients and will learn about opportunities to easily begin this exciting new technology in their environments as a way to begin preparing for the coming Zero Trust mandate.
Navigating CMMC Compliance: The Integra...
The recent notice of proposed rulemaking for the Cybersecurity Maturity Model Certification (CMMC) program made one thing for certain: the U.S. Department of Defense is serious about external service provider (ESP) security. Under the proposed regulation, U.S. defense contractors will need to pay close attention to their Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) who qualify as ESPs to ensure they also achi...
Automate Your Zero Trust Workflow
During this webinar, Zack and Willie discussed: How PC Matic's innovative technology modernizes traditional Software Bill of Materials (SBOM), Zero Trust, CDM, and Secure by Design initiatives How the solution streamlines Zero Trust policy enforcement points, simplifying governance processes while bolstering compliance efforts. How the solution integrates seamlessly into existing infrastructures, optimizing operations without solution disrupti...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.