Back to Search Begin New Search Save Search Auto-Notify
Cost Allocations for State and Federal...
How does your agency calculate its costs? Is your agency government-funded, or do you calculate the price of a service cost to charge to the public? Watch this on-demand webinar to understand how state and federal agencies use cost allocation software to understand their costs and manage their budgets with ease. Whether you are a seasoned financial manager or just starting out in IT, finance or operations, this webinar will help you understand...
Add Favorite
Leveraging Identity Intelligence to Det...
During this webinar, SmartView® explained why identity intelligence is a critical component of any Insider threat monitoring workflow. ManageYOURiD’s industry leading identity intelligence platform, SmartView® enables analytics of identity attributes to support insider threat investigations, optimizes analyst efficiency, and informs decisions. Integrating SmartView® into your Insider Threat workflows empowers analysts and supports inside...
Add Favorite
Assessing Legacy Optical Transport Networks
Many legacy optical networking solutions reached End of Life (EOL) or End of Support (EOS). These aging platforms—widely deployed in the 2010s—remained in use for metro data centers, cloud, and enterprise connectivity. However, with the growth of AI/ML applications and data centers, modernizing optical networks became essential to meet increasing capacity and service demands.Attendees learned:Which platforms and services are no lon...
Add Favorite
Smarter Citizen Services with Multiling...
This webinar explored how AI is transforming citizen services—helping residents get the support they need, in the language they prefer, while ensuring that AI continuously improves with real-world interactions.Attendees learned about:Live chat escalation: When AI needs a human hand-off, how to make it seamless and efficientThe AI learning loop: How AI, live chat, and expert oversight work together to ensure smarter, more accurate respons...
Add Favorite
Transform Your Cloud Security Posture w...
In the ever-evolving landscape of cloud security, managing identities and entitlements is the key to protecting your organization's sensitive data. In this webinar, attendees gained:A clear roadmap to achieve deep multi-cloud visibility and continuous discoveryA review of how Tenable Cloud Security helps DOE agencies meet key iJC3 program objectivesStrategies to streamline risk analysis and auto-remediate excess permissionsPractical tips for e...
Add Favorite
Slash Your FedRAMP Certification Time:...
Attendees of this webinar joined us to discover how leading organizations are achieving FedRAMP certification in record time through intelligent automation.We revealed a proven framework that helps you:Automatically eliminate up to 95% of security vulnerabilities before they reach productionCut certification timelines by months while reducing operational costsMaintain continuous compliance with ongoing remediation of the emerging CVEs
Add Favorite
OMB, FISMA & CISA Zero Trust Data Compl...
During this webinar, attendees learned how combining Zero Trust principles of XQ with AWS infrastructure enables agencies to streamline FISMA audits and stay ahead of CISA directives, enhance data governance and ensure compliance with federal frameworks and protect sensitive data by using encryption, geofencing and external key management.
Add Favorite
Bridging Healthcare Sectors with Digita...
Digital identity wallets are poised to revolutionize healthcare interoperability by securely unifying fragmented patient data across private and public systems. This webinar explores how digital wallets empower patients to control their health information while enabling seamless, consent-driven data sharing between providers, insurers, and government agencies. During this webinar, our speakers will discuss:Cross-Sector Data Exchange: Real-time...
Add Favorite
NIST NCCoE Practice Guide: Implementing...
F5 hosted an exclusive webinar on implementing Zero Trust architectures, featuring a special guest speaker from NIST. F5 provided an overview of how its technologies apply to Zero Trust Architecture, including where F5 BIG-IP fits within this NCCoE practice guide implementation. During this webinar, attendees:Explore the NIST National Cybersecurity Center of Excellence (NCCoE) and its critical work in developing real-world implementation guide...
Add Favorite
Leveraging Dark Web Intelligence for Re...
Attendees of this webinar learned about how in today's world, Open Source Intelligence (OSINT) plays a critical role in uncovering threats and mitigating risks by leveraging publicly available information. This webinar dove deep into the practical side of OSINT investigations, focusing on how dark web data can be strategically utilized to enhance threat detection and risk assessment for organizations. During this webinar, the Director of Intel...
Add Favorite
Back to Search Begin New Search