Transforming Public Service: How Geoloc...
How many times during your week or month do you navigate a map to make decisions about things like where you’re going to dinner, your running route, or which dry cleaner is closest to your office? What if finding a government service could be just as user-friendly, in an application that is familiar? During this webinar, Avaap explored how geolocation technology is transforming government services. We investigated the innovative solution...
Unlocking the Power of Symantec SASE fo...
This webinar discussed how Symantec Secure Access Service Edge (SASE) can transform your security strategy, providing seamless protection across all your end-points, users, and applications. Key topics discussed during the webinar include:The evolution of SASE and its role in securing workforcesHow Symantec SASE integrates with existing infrastructures to ensre scalability and flexibiltyDeep dive into Symantec's cloud-delivered security servic...
Accelerating Federal Insights with Auto...
Access this Alteryx & GAI webinar recording to discover how federal agencies can save thousands of hours by automating manual data processes and leveraging advanced analytics. Discover how one agency transformed its operations, achieving efficiency and accuracy with the Alteryx Enterprise Platform.During this webinar, attendeesExplore scalable analytics solutions for federal missions and workflows.Learn how automation replaced 2,000 hours...
Data Management Finally Made Simpler -...
Are you curious about how to transform your data management? Attendees learned how to:How to simplify complex data managementBring together different types of storageIncrease efficiency and unlock new opportunitiesRegister today for this partner session on how to securely manage data across any environment.
ATO in a Day: Lessons from the USMC MCC...
Legacy compliance practices and waterfall acquisition models have hindered mission readiness for years—costing for some over $100K per month, per system and delaying the deployment of critical systems by more than two years. Between 2018 and 2022, only one of five major ATOs achieved a 3-year authorization, frustrating leadership and perpetuating bottlenecks. This fireside chat revealed how the USMC Community Services tackled these chall...
Enhance Your Email Security with Mimecast
In today’s ever-evolving threat landscape, email security is more critical than ever. Attendees of this exclusive demo learned how Mimecast's advanced email security solutions can protect their organizations from the latest threats. View the on-demand recording to learn more about how Mimecast can protect your organization!
F5 Capture the Flag
The F5 DISA team hosted an interactive Capture the Flag competition where attendees competed against others to hunt for API vulnerabilities and learn how they work. In this lab and Capture the Flag exercise, attendees learned how to identify and mitigate:Hard-Coded Secrets: Many applications exchange user credentials for a hard-coded token or key. This key allows anyone who knows it to gain access to the application, however, many times these...
The Circle of Viz: Content Promotion Li...
Discover strategies for managing projects, user groups and content permissions to effectively promote and distribute content across your Tableau environment. Learn how to streamline Tableau content management, simplify processes and boost work efficiency. During this webinar, attendees learned:The Key Metrics of Success: Develop a plan and set measures to gauge the success of Tableau content promotion efforts.Site and Project Architecture: Div...
Operationalizing Zero Trust: NIST and B...
Over 15 years since its initial conception and more than three years since the U.S. federal government made it a fundamental tenet of its overall cybersecurity strategy, Zero Trust has only become more important as a strategic framework for government and critical infrastructure alike. While the imperative to implement Zero Trust has been well established, the question of “how” is less clear. Enter NIST and the National Cybersecuri...
How to Engage with CIOs
In this exclusive partner webinar, Ted Brodheim, former CIO and current Global CIO Advisor at Zoom Communications, shared his expert perspective on successfully engaging with Chief Information Officers (CIOs).In this session, Ted provided Zoom resale partners with a deeper understanding of what CIOs prioritize when purchasing technology, how they navigate the buying process, and how to foster strong relationships with these key decision-makers...
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.