Back to Search Begin New Search Save Search Auto-Notify
Using the Tableau Catalog + Lineage
During this webinar, attendees:Explored how Tableau Catalog provides a comprehensive view of data lineage, tracing data from its origin to its consumption, helping organizations ensure data quality and compliance.Learned how to effectively navigate Tableau Catalog to explore and understand the relationships between data assets, workbooks, and dashboards. Explored the role of Tableau Catalog in enhancing data governance practices within organiz...
Add Favorite
Fortifying the Future: Data Security Po...
Forcepoint, and Carahsoft hosted a webinar titled Fortifying the Future: Data Security Posture Management which focused exclusively on DSPM for federal agencies. In this session, you learned how to protect information critical to our nation's security, leveraging AI to quickly and accurately provide control and accountability for Federal Government Security Officers. Ongoing digital transformation projects at federal agencies have delivered a...
Add Favorite
Salesforce Los Angeles Innovation Day
Those who attended Salesforce's LA Innovation Day gained insight on key topics surrounding: Digital Transformation in LA: Insights and strategies from Ted Ross, CIO of LA.Salesforce Solutions: Including C360 for Citizen Services and other demos.Transportation Planning for LA28: Panels on preparations for the 2028 Olympics.Educational Innovations: Learn more about K12 and Higher Ed solutions.
Add Favorite
From the Frontlines: Lessons learned fr...
Deploying Zero Trust for an Operational Technology network differs from deploying it on an IT network. Dragos and BlastWave have learned hard lessons with customers on the best practices for deploying OT Zero Trust in the real world and shared these lessons with attendees. They also explored how the pillars of the multiple OT cybersecurity frameworks (NIST, DoD, NIS2, etc.) are combined to provide a deployable solution for critical OT networks...
Add Favorite
Enhancing Homeland Security Operations...
In today's fast-paced digital environment, the Department of Homeland Security (DHS) faces complex challenges in maintaining robust IT operations and ensuring the security of critical infrastructure. This webinar included the transformative potential of Splunk IT Service Intelligence (ITSI) to streamline and enhance IT operations within DHS. Participants joined us as we explored how Splunk ITSI’s advanced analytics, machine learning capa...
Add Favorite
Transform Your Printing Operations - Tu...
Participants joined the Tungsten Automation webinar to learn more about how Printix could transform their printing operations and unlock new possibilities for their business. Printix was introduced as a cloud-based print management solution that offered a comprehensive print infrastructure and secure printing environment. It was designed to enhance efficiency, productivity, and cost savings for businesses of all sizes. By eliminating the need...
Add Favorite
Using PPKs for Post-Quantum Security in...
Accelerating advancements in quantum computing are making the prospect of breaking classical cryptography more real with every passing today. Organizations rely on firewall site-to-site IPSec VPN security to protect their critical data. However, threat actors are already storing encrypted communications today to decrypt in the future, using quantum computing or other advanced capabilities (aka “Harvest Now, Decrypt Later”). IPSec V...
Add Favorite
Mastering Enterprise Agile with ServiceNow
In an era where missions evolve at lightning speed, staying ahead requires more than just quick thinking - it demands agile planning and flawless execution. The stakes have never been higher for agencies and commands to adapt swiftly and ensure their teams are prepared and empowered with cutting-edge tools and strategies. This dynamic discussion helped attendees elevate their Agile game. They learned how they can transform their Agile delivery...
Add Favorite
Empowering Higher Education: Preparing...
In today’s rapidly evolving academic landscape, leveraging the power of AI-driven tools like Copilot for Microsoft 365 is essential to stay ahead. Attendees joined us for an in-depth exploration of how Higher Education institutions could prepare to unlock the full potential of Copilot for Microsoft 365. This webinar guided attendees through seamlessly integrating Copilot into their organization, enhancing efficiency and enriching experie...
Add Favorite
From Compliance to Leadership: How CMMC...
On October 10th, our distinguished panel explored how organizations can leverage CMMC (Cybersecurity Maturity Model Certification) not only to meet compliance requirements but to elevate their long-term security leadership. By gathering insights from top experts across industries, the panel demonstrated how CMMC acts as a catalyst for building a more mature and resilient security posture, enabling businesses to lead confidently in the face of...
Add Favorite
Back to Search Begin New Search