Back to Search Begin New Search Save Search Auto-Notify
F5's AI Gateway: The One-and-Done Solut...
Attendees joined us for an in-depth discussion on how AI architectures are designed. Attendees learned from F5's AI experts on where AI applications are most vulnerable (and why) and how F5’s portfolio of security solutions, including AI Gateway, can help protect those applications. We also dove into how API discovery helps you architect AI applications. Lastly, the MVP will be a demo of F5’s AI Gateway!
Add Favorite
Building Tomorrow's Workforce with Sale...
In the webinar, participants discovered how Salesforce’s Talent Recruitment Management is revolutionizing public sector hiring. The session explored how this innovative solution can streamline the entire talent management journey—from workforce planning through retirement—empowering agencies to accelerate hiring, improve the candidate experience, and ensure compliance. What Was Explored:Leverage Salesforce's Talent Recruitmen...
Add Favorite
How to Protect Assets in a Connected Wo...
Attendees were joined by Connor Rhodes, Enterprise Solutions Engineer at Verkada, on Thursday, March 27th, as he walked through:Cybersecurity principles for both on-prem and cloud-based systemsHow to safeguard risks that organizations face todayAnd so much more about Verkada's security solutions for state and local government organizations
Add Favorite
Leveraging Public Data to Identify FOCI...
Foreign Ownership, Control, or Influence (FOCI) poses a growing risk to US government contractors, especially amid increasing investment from various governments, specifically China, into foreign companies. Understanding these vulnerabilities is crucial to preserving US and allies' national security.Listen to our expert speakers as they demonstrate how to detect FOCI risks by analyzing ownership structures, supply chain exposure, and dual-use...
Add Favorite
Cyber Resilience at the Crossroads
Cyber threats against U.S. infrastructure and the defense industrial base (DIB) are increasing at an alarming rate. Attacks from nation-state actors are compromising supply chains, contractors, and small-to-medium businesses at unprecedented levels. The White House’s NSM-22 directive underscores the urgency of securing critical infrastructure—but many organizations remain vulnerable. Topics discussed during this event include:How n...
Add Favorite
Simplify, Scale, Succeed: The Power of...
Managing hybrid clouds can be challenging, automation turns complexity into simplicity. Attendees to this webinar learned how automating your cloud infrastructure with Red hat Ansible Automation Platform can simplify management, reduce manual tasks and ensure greater scalability and security for state and local governments, as well as educational institutions. Attendees joined us virtually for a discussion on how Red Hat Ansible Automation Pla...
Add Favorite
CTO Sessions: Intersection of AI and Security
Artificial intelligence (AI) is rapidly transforming our world, from the way we work to the way we interact with machines. But, with this immense power comes immense responsibility. As AI becomes more sophisticated, so too do the security risks. This CTO Session focused on the critical issues at the intersection of AI and security. Our speaker, Gina Scinta, explored:Countering malicious use of AI systems by actors with ill intentions, such as...
Add Favorite
Adobe Connect Experience Design Webinar
Watch this on-demand webinar where Alistair Lee, Principal Evangelist at Adobe, teaches you how to craft immersive, interactive, and highly engaging virtual experiences with Adobe Connect. Specifically, learned about:Build fully branded, reusable room templates from scratchDesign virtual spaces that instantly encourage engagementLeverage layouts, polls, custom pods, and breakout activities to drive interactionGet inspired with creative designs...
Add Favorite
ADF Solutions Webinar Accelerating Mobi...
In the realm of mobile digital forensics, "triage" traditionally refers to a swift, preliminary examination of evidence. This often involves rapid evidence and intelligence collection without a full device image. Advancements in technology have revolutionized this approach, leading to the emergence of intelligent triage. What is Intelligent Triage? Intelligent triage takes the concept of rapid assessment to a new level, incorporating automatio...
Add Favorite
Smarter IT, Stronger Agencies: Automate...
Federal financial agencies streamlined IT operations with the power of automation. Our March 27th virtual event showcased how integrating the Ansible Automation Platform (AAP) with ServiceNow IT Service Management (ITSM) accelerated service requests, enhanced security, and ensured auditability through closed-loop automation.
Add Favorite
Back to Search Begin New Search