Modernizing Federal PPBE: Connecting St...
Today, the Planning, Programming, Budgeting, and Execution (PPB&E) process faces challenges of complexity, fragmented data, and the need for cross-agency alignment. In this session, ServiceNow experts demonstrated how Strategic Portfolio Management (SPM) helps the Department of Defense modernize PPB&E execution by providing visibility into program requests and investments, supporting collaborative planning across stakeholders, aligning...
Operation Missionforce Control: The Dig...
Managing a Federally Funded Research and Development Center is one of the most complex leadership challenges in the nation. DOE labs like Los Alamos face mounting pressure to deliver on national security missions while navigating outdated systems and disconnected data. This “flying blind” approach risks delays, overruns, and safety incidents that threaten performance-based fees and core objectives. Attendees explored a proven model...
Voice Security in the Public Sector: De...
The voice channel is the most under-protected entry point into public sector organizations, and attackers know it. From AI-powered vishing and social engineering to spoofed calls, robocalls, and voice spam storms, adversaries are weaponizing telephony to bypass traditional defenses and compromise sensitive data. During this exclusive webinar, hear from experts who will expose the current voice threat landscape, reveal attack tactics and trends...
Modernizing Legal: From Experiments to...
Public sector legal departments are expected to do more with less-while demonstrating accountability, efficiency, and measurable value. Meeting that mandate requires more than isolated pilots; it takes a deliberate program of digital transformation and operational modernization.Watch this on-demand webinar that demonstrated in-house legal and legal ops teams how to shift from experiments to enterprise-scale change: redesigning workflows, inves...
Early Warning Signals: The Strategic Va...
In today's volatile geopolitical landscape, the U.S. defense sector relies on thousands of Tier 2 and Tier 3 subcontractors for everything from missile systems to advanced AI chips. Yet, most traditional procurement and threat-monitoring tools fail to detect early signals of instability in these vendors, especially when the signals originate from foreign media, regulatory notices, or obscure disruptions buried in unstructured content.This webi...
Intelligent Data for JADC2: Powering Mi...
The Department of War faces immense pressure to enhance operational effectiveness, yet critical initiatives like Joint All-Domain Command and Control (JADC2) are complicated by overwhelming volumes of fragmented, siloed data and persistent challenges with outdated legacy systems. These issues hinder efficient data migration, leave vital information unprepared for scalable AI and cause modernization delays that impact mission readiness.Unlockin...
Geospatial for Tactical Analysis
Snowflake hosted an immersive, hands-on training session designed for public sector professionals to harness their advanced geospatial capabilities for mission-critical analysis. Participants learned to perform bounding searches, co-traveler analysis, and focus area identification to detect activity hotspots. The session also covered advanced visualization techniques, including HEX grids and histograms, path characterization with line-string a...
Faster Investigations, Smarter Seizures...
Discover how AI surfaces hidden connections, translates massive amounts of unstructured data into insights and gives investigators a decisive edge in tracking and apprehending criminal actors.In this webinar, attendees learned:Ways AI surfaces and prioritizes suspects, saving valuable time by finding “needles in haystacks”Techniques to illuminate criminal networks and map hidden relationships between people, events and locationsHow...
Fighting Fraud Without Friction
Plum is the first “built for government” identity validation solution. It calculates an applicant's risk score using tens of thousands of data points to identify stolen and synthetic identities, bots, drop houses, mules, suspicious devices, and foreign and domestic fraud organizations. Watch this on-demand webinar to discover best practices that governments should consider to improve program safeguards. Specifically, viewers will l...
Spot the Phish! Email Security with Splunk
Learn how Splunk Attack Analyzer empowers SLED IT teams to quickly identify phishing threats and automate response actions, reducing manual effort and improving security outcomes. In this webinar, attendees learned:Understand why phishing attacks are increasingly complex and manual analysis is unsustainableLearn how Splunk Attack Analyzer automates threat analysis to save analysts timeSee real-world results showing better detection accuracy an...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.