Back to Search Begin New Search Save Search Auto-Notify
Ready for 2024: How Coordinated Vulnera...
With the 2024 election right around the corner, security and integrity are on your constituents’ minds. HackerOne convened a panel of cybersecurity and election integrity subject-matter experts to give leaders insight into new best practices in coordinated vulnerability disclosure (CVD). During this webinar, we reviewed the success of a recent hacker challenge conducted by the Election Security Research Forum and leading voting technolog...
Add Favorite
Work Smarter Not Harder: Eliminate Your...
Business processes throughout the federal government are complex, so an agency's ability to easily identify workflow bottlenecks and implement meaningful process improvements is critical to achieving agency mission. Imagine a one-click experience to identify bottlenecks in a workflow, and a second click to generate recommendations for process improvement. We call this Process Mining, and delivered across your HR teams, can truly unlock digital...
Add Favorite
Zoom Trainings - November 2023
You're invited to attend our Zoom Training session! You will have the opportunity to meet with one of our Zoom specialists to teach you everything you need to know to utilize your Zoom account to its full capabilities. Take the time to ask us questions, inform us about your requirements, and discover more about how Zoom can help both you and your organization. Learn more about the variety of tools offered by Zoom including: Account customi...
Add Favorite
Learn about Microsoft Sentinel DoD Zero...
According to the Microsoft Digital Defense Report of 2022, the United States government network is the target of nearly half of global nation-state attacks? The US Department of Defense released its initial Zero Trust reference architecture in 2022.The latest update provides crucial details for implementing the Zero Trust strategy, including clear guidance of 45 separate capabilities and 152 activities needed to adopt a consistent approach. Jo...
Add Favorite
CTO Sessions: A Guide to BYOK and HYOK...
Cloud Security Alliance best practices require that keys be stored and managed outside of the cloud service provider and the associated encryption operations. Cloud Service Providers therefore offer Bring Your Own Key (BYOK) or Hold Your Own Key (HYOK) services to enable customer control of the keys used to encrypt their data. Customer control of the keys allows for the separation, creation, ownership and control, including revocation, of encr...
Add Favorite
Harnessing Observability: Illuminating...
Dynatrace hosted a virtual event the week before DoDIIS 2023 to explore how enhanced observability is enabling government teams effectively manage and understand their complex IT environments, transforming chaos into clarity.Dynatrace provides agencies with precise answers via intelligent automation and the solutions needed to accomplish the objectives of a Zero Trust architecture with AI-enabled continuous observability, analytics, automation...
Add Favorite
Prioritize Mission Delivery and Constit...
In today's landscape, delivering on promises to your constituents and strengthening their trust in your agency or organization is key to your mission. In this archived webinar, attendees learned how to protect the Salesforce data that drives your mission. Attendees of this on-demand webinar will explore: Mission delivery Continuity Security
Add Favorite
How to Deploy and Effective Machine Lea...
Artificial intelligence (AI) and machine learning (ML) are becoming increasingly mission critical as the volume, variety, and velocity of data advances beyond what many government agencies have the tools to manage. Join Cloudera as they explore how government agencies can utilize ML and build a secure ML strategy through Cloudera Machine Learning (CML) to create a seamless hybrid cloud ecosystem. In this on-demand webinar, attendees learned ab...
Add Favorite
Introducing Cirrus by Veeam - BaaS for...
In this on-demand webinar, attendees learned more about Cirrus by Veeam, the #1 backup software for Microsoft 365 now as a service. During this session, attendees saw: Backup as a Service for Outlook Emails, Calendars, and Contacts, OneDrive for Business, SharePoint Online, and Teams Chats and Channels. Granular Role Based Operator and Self-Service recovery Simplified Administration with Unlimited Storage and Retention
Add Favorite
Managing Multi-Cloud Environments in 3 Steps
Multi-cloud application strategies have created unnecessary complexity in managing hybrid environments and services. Government agencies have an added hurdle with strict compliance and security concerns. Greymatter.io services multiple government agencies with improved security, visibility, and control over their application environments. Some of the most sensitive agencies in the U.S. trust Greymatter.io to safeguard their data. Greymatter.io...
Add Favorite
Back to Search Begin New Search