The Future Belongs to Learners Series:...
Take your ChatGPT skills to the next level. In this session, participants learned how to use advanced tools - Deep Research, Projects, Data Analysis, Canvas, Connectors, and ChatGPT Agent - to move from simple prompting to structured, repeatable workflows. OpenAI demonstrated how these capabilities helped government teams collaborate, analyze data, and deliver results more efficiently while maintaining enterprise security and compliance.What P...
Employing AI to Bring Order and Value t...
Key topics included:The challenges associated with traditional document management processes and technologyHow advanced technologies like Artificial Intelligence and Machine Learning bring time savings and order to high volume, multi-stage document processingTaking advantage of the resulting improved data to streamline business processes
Hyland & AWS Digital Transformation Jou...
Digital transformation isn’t a one-size-fits-all leap — it’s a journey. Whether you’re exploring possibilities or looking to fully optimize your operations, Hyland & AWS's three-part webinar series will guide you through each stage of the process: Crawl. Walk. Run. Hyland & AWS experts hosted online sessions to break down practical steps, proven strategies and real-world examples to help your agency confidently...
Archer Continuous Controls Monitoring
In this webinar, attendees explored:How Cypago connects and analyzes data to automate IT complianceThe role of Archer Continuous Controls Monitoring in reducing manual effortBest practices for integrating Archer and Cypago to enable continuous monitoringPractical use cases for streamlining audits and strengthening compliance posture
Beyond MDBR: Why SLED Organizations are...
MS-ISAC’s free Protective DNS (MDBR) ended on October 1. With funding discontinued, the need to act is urgent. But this moment presents more than just a replacement decision; it’s an opportunity to upgrade this critical layer of cyber defense. Infoblox Threat Defense is the mature, best-in-class alternative, trusted by Federal and SLED organizations to deliver proactive, intelligent and resilient DNS-layer security. It ensures comp...
Fortra's MFT Solution
What Attendees Learned:How to use ICAP with GoAnywhere to apply and enforce sensitivity labels created by Fortra’s Data Classification SuiteWays to monitor and block sensitive data from being sent to unauthorized destinationsHow integrated Clearswift content scanning detects and stops malware, viruses, and banned file types
Full Throttle, Firm Control: Build Your...
State and local leaders are under pressure to deliver modern services, fast—and agentic AI looks like the accelerant. But autonomy introduces new risks you’re not staffed or tooled to absorb: emergent behaviors, goal hijacking, privilege sprawl and cascading failures that evade traditional controls. This session introduced Forrester’s AEGIS (Agentic AI Enterprise Guardrails for Information Security) framework, a practical blu...
Using Real-Time OSINT to Defend Against...
During this session, attendees:Learn how to aggregate, analyze, and act on open-source intelligence to detect threats earlier.Discover how to correlate cyber indicators with physical incidents for a unified risk picture.See real-world use cases of OSINT enhancing decision-making and operational readiness
From Sensors to Digital Twins: Real-Tim...
SAS and partner subject matter experts showed an insider’s view of the tools and strategies that some leaders in flood management are already deploying to better protect their citizens, as well as case studies that show how these approaches work in real-world scenarios such as: Rapid population growth, intensifying weather events, and legacy infrastructure are driving urgency for smarter flood management solutions. Local governments may...
Unlock the Power of OpenShift Virtualiz...
Carahsoft and Red Hat hosted an interactive virtual training that empowered IT teams to modernize operations and strengthen OpenShift skills. With growing demands for agility and efficiency, this hands-on session allowed participants to gain real experience in a live sandbox environment while learning best practices from Red Hat certified instructors.This training helped attendees:Build technical confidence through guided exercisesStreamline w...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.