Back to Search Begin New Search Save Search Auto-Notify
From Compliance to Leadership: How CMMC...
On October 10th, our distinguished panel explored how organizations can leverage CMMC (Cybersecurity Maturity Model Certification) not only to meet compliance requirements but to elevate their long-term security leadership. By gathering insights from top experts across industries, the panel demonstrated how CMMC acts as a catalyst for building a more mature and resilient security posture, enabling businesses to lead confidently in the face of...
Add Favorite
Leveraging Digital Data to Enhance Pris...
During this webinar, Cellebrite experts Lee Papathanasiou and Matt Goeckel dove into innovative strategies and technologies used to combat criminal activities within correctional facilities. This webinar highlighted the importance of digital intelligence in identifying and mitigating threats posed by contraband devices, ensuring the safety of both inmates and staff. Attendees gained insights into the latest tools and methodologies for collecti...
Add Favorite
Optimizing Naval Logistics and Readiness
During this session, our expert speakers dove into how Salesforce’s powerful technologies, including Tableau, Mulesoft, and Slack, integrated with AWS’s robust cloud infrastructure, are reshaping naval operations.Attendess learned:Innovative Solutions: How these technologies enhance operational efficiency, asset management, and readiness planning.Practical Use Cases: Real-world examples of seamless data integration, real-time analy...
Add Favorite
Navigating UCaaS Migration: A Strategic...
We wrapped up an insightful webinar featuring Zoom and Packet Fusion, where public sector leaders explored the transformative potential of Zoom’s integrated UCaaS (Unified Communications as a Service) platform for State, Local Government, and Education (SLED) organizations. The session highlighted how Zoom’s UCaaS seamlessly integrates voice, video, messaging, and file sharing, enabling teams to communicate effortlessly across depa...
Add Favorite
Navigating the Complexities of Multimed...
The growing volume of digital evidence, like CEM and CSAM, can make identifying and preserving crucial information overwhelming. Our upcoming webinar will provide strategies to streamline your workflow and leverage advanced tools like filters and quick video frame previews to speed up evidence review and improve accuracy. Access this on-demand webinar recording to learn how cutting-edge digital forensics can transform your investigative proces...
Add Favorite
AI for the Rest of Government Part One:...
This webinar identified and explored current concerns regarding the adoption of AI in government agencies. Attendees created a foundational understanding of how to utilize AI within their agency.This session explored:How agencies can prepare to take advantage of AI.How to quickly and easily organize digital messes at scale.How agencies can best communicate with employees about AI.Register now to start your journey in understanding and utilizin...
Add Favorite
Capturing E-Rate Pilot Dollars For Your...
Student safety is a top priority, especially as cybersecurity challenges continue to grow in the educational environment. The problem we face today is how to effectively leverage AI to enhance security while improving efficiency and reducing employee burnout with limited staff.How can we ensure that our cybersecurity teams are equipped with the tools they need, despite resource constraints?During this complimentary webinar, attendees learned:H...
Add Favorite
Protecting Modern Applications and Secu...
Government departments and agencies are increasingly turning to modern applications to improve their communications with and responsiveness to the public. Government records and data that were previously isolated and difficult for the public to access are now becoming widely available through APIs. While the data being made public through APIs is not the concern, the increased threat vector is.Securing modern API based applications in such an...
Add Favorite
F5 Red Hat Tech on Tap
Application and API security are rapidly evolving. Faced with new challenges that span traditional on-premise data centers, distributed multi-cloud environments, and legacy versus modern application deployments, the DoD requires flexible solutions to rapidly address a surging attack vector and an expanding threat landscape. On this Tech on Tap tour stop, we focused on these new security threats and provided you with real-world examples of some...
Add Favorite
Maximize Your Dollars with the FCC Cybe...
Securing Your School with Cybersecurity Pilot Program Funding Attendees discovered how to secure their school with the E-Rate dollars and take advantage of the Federal Communications Commission’s (FCC) new Cybersecurity Pilot Program. This webinar provided insights into leveraging these resources to enhance your school's security infrastructure. Learn about the specifics of the Cybersecurity Pilot Program, which offers additional financi...
Add Favorite
Back to Search Begin New Search