Back to Search Begin New Search Save Search Auto-Notify
Optimize Your Digital Document Workflow
In today’s hybrid digital world, many organizations are still held back by legacy manual, paper-based workflows that require a revamp. Adobe Acrobat Pro can help address the hurdles that are often encountered in sending out documents for signature, creating forms, and digitizing older content. Watch the on-demand webinar to see how Adobe Acrobat Pro can help update day-to-day processes to keep up with increased demand for versatile digit...
Add Favorite
Firearm Violence Prevention: Community...
Community violence interrupters are an emerging evidence-based strategy for Community Violence Intervention (CVI) and firearm violence prevention. Interrupters have relationships with the community and work to intervene, mediate, and deescalate often retaliatory cycles of violence. They are an on-the-ground, trusted presence and can be invaluable in mitigating community violence. This webinar will explore strategies to engage interrupters in c...
Add Favorite
The Importance of OSINT in Defense Operations
As we navigate increasingly complex global security challenges, harnessing OSINT has proven indispensable in enhancing situational awareness, intelligence gathering, and strategic decision-making. OSINT encompasses the collection and analysis of publicly available information from a variety of sources, including social media, news outlets, blogs, and government reports. Unlike classified intelligence, OSINT provides a broad, real-time perspect...
Add Favorite
Empowering Federal Cybersecurity: Imple...
Attendees joined OffSec for a webinar to learn how implementing skills-based hiring for cybersecurity roles in the federal government poses several challenges. First, there's the issue of standardizing assessment methods across agencies. Unlike traditional practices relying on education and experience, skills-based hiring requires reliable tools like simulations and practical tests to assess competencies accurately. Ensuring uniformity across...
Add Favorite
Tableau Enablement Series Part 8: Seize...
This session allowed attendees to learn how to quickly adapt their data to Accelerators and other Tableau templates in order to speed up the time to data-driven decisions and valuable outcomes. During this webinar, attendees learned more about:Adapting Data to AcceleratorsUtilizing Tableau TemplatesSpeeding Up Data-Driven DecisionsAvoiding Common PitfallsTroubleshooting Techniques
Add Favorite
Achieving CMMC Compliance: Ensuring Dat...
Thank you for your interest in our Rubrik CMMC webinar: Achieving CMMC Compliance: Ensuring Data Protection & Cyber Resilience with Rubrik Attendees of this webinar heard from Bill Hackley, Federal Sales Engineering Manager at Rubrik, about the essential aspects of CMMC compliance and how Rubrik can help organizations meet CMMC standards through:Advanced data protectionData managementEnhancement of cybersecurity measures
Add Favorite
Meet the Presidential Cybersecurity Man...
Watch this on-demand webinar designed to empower federal agencies to achieve the cybersecurity goals outlined in the latest presidential mandate. Discover how RSA's newly FIDO2-certified authenticator app can transform your agency's security infrastructure. Learn how the RSA authenticator app can help federal and other government agencies defend and modernize key infrastructures, enhance and scale collaboration between public and private secto...
Add Favorite
Improve Video Workflows with Integrated...
Adobe Premiere Pro is constantly improving to make creatives' workflows simpler - and with Adobe Premiere Pro plus Frame.io, collaboration between designers or teams has never been easier. Learn how to streamline video editing workflows by combining the power of Adobe Premiere Pro and Frame.io. Discover advanced editing techniques like applying edits, transitions, and masking for professional-looking videos. Watch our on-demand webinar to disc...
Add Favorite
CTO Sessions: Cloud HSM Best Practices
Although federal agencies are deploying cloud solutions at a rapid pace, they are often hesitant to move their core cryptographic infrastructure to the cloud—namely their roots of trust. Hardware security modules (HSMs) are used as a root of trust and generate, store, protect, and manage cryptographic keys used to secure sensitive data and critical applications. HSMs are traditionally deployed on-premises but they can be safely deployed...
Add Favorite
Safeguarding State, Local and National...
In today’s landscape of increasingly sophisticated cyber threats, safeguarding state, local and national security is more crucial than ever. Proofpoint and Carahsoft are thrilled you attended our webinar. We explored how the Cybersecurity Maturity Model Certification (CMMC) can enhance your security posture and how Proofpoint’s state-of-the-art impersonation protection can be a key component in this effort.Thank you for joining us...
Add Favorite
Back to Search Begin New Search