CTO Sessions: The Underappreciated Tact...
Databases are key targets for hackers looking to steal data. However, there is insufficient emphasis by the MITRE ATT&CK Framework on the Collection tactic regarding access of data from a database. Hackers collect data through eavesdropping/man in the middle attacks of data in transit, by capturing data at the point of collection (such as point of sale devices), exfiltrating files containing sensitive data, etc. But the motherlode is the d...
MariaDB: The Open Source Standard
Is your organization tired of overpaying for database solutions that don't meet their needs? Introducing MariaDB Enterprise Server, a reliable, cloud-native database that allows organizations to have the freedom to go anywhere at a fraction of the cost of proprietary databases. MariaDB Enterprise Server offers unmatched performance, scalability and reliability. It's designed to handle the demanding workloads and complex data requirements of go...
HISPs in 2025: The State of Federal CX
We invite you to watch this Federal News Network event as Reporter Jory Heckman sits down with technology leaders from across government to learn what’s on the horizon for HISP agencies as they continue to evolve customer experience, employee experience and total experience. This exclusive event wrapped a year-long focus on federal HISP and CX efforts to digitize and drive better service to the public. The event began with a fireside cha...
Modernize and Optimize Government Servi...
Modern citizens and city staff today expect the same level of service from government agencies as they do from the private sector. Yet, citizen experiences are broken. Government agencies are far from becoming truly digital-first organizations. Listen on demand from subject matter expert John Gambaro as he discussed:Top technology trendsFreshworks' integral GenAI based capabilitiesAffects of government and education institutionsModernization i...
F5 Webinar: Protect the APIs You Never...
We all use APIs, work with APIs, and attempt to secure APIs. But are you sure you have them all discovered? Are you sure that the calls to the APIs are sanitized and protected from malicious calls?This webinar covered F5 Distributed Cloud ability to scan applications for rogue APIs, understand them, then apply a comprehensive protection that includes passive scanning to continuously tune your protection. In this webinar, attendees learned abou...
Overcoming Zero Trust Challenges in Fed...
As federal agencies advance toward implementing Zero Trust Architecture (ZTA), the path is often met with challenges ranging from managing access controls to ensuring continuous monitoring and policy enforcement. Attendees joined us to learn how ServiceNow offers a powerful, integrated platform designed to meet these needs, supporting agencies in achieving ZTA compliance and enhancing security resilience.Registrants learned how ServiceNow Secu...
How EDD's Cybersecurity Division Evolve...
Is your public sector organization struggling to combat cyber attacks? Attendees joined Elastic and California EDD to learn how Elastic provided the EDD with real-time visibility into their systems, enabling them to detect and prevent cybersecurity risks early on. During this session, Elastic & California EDD experts discussed:California's enhanced ability to identify suspicious patterns and anomalies in their dataCalifornia's improved inv...
Next-Gen Judicial Efficiency: Investiga...
Attendees joined us on Tuesday, December 3rd for an insightful webinar that explored the integration of Salesforce and Docusign for the judicial and law enforcement industry. This session demonstrated how Salesforce's powerful CRM capabilites seamlessly integrate with Docusign Intelligent Agreement Management solutions to streamline judicial procceses and improve efficiency.
Enhancing GIS Operations for Airports
As airports navigate complex operations, GIS technology becomes essential for integrating data from multiple systems, providing a comprehensive view of operations. This recording showcases insights from industry experts and explore the critical role of GIS in airport operations followed by a collaborative discussion. Watch this on-demand recording to view this virtual roundtable focused on GIS operations in the aviation sector. This recording...
Strengthening Cybersecurity in the Judiciary
As the digital transformation of the judiciary accelerates, courts are increasingly reliant on technology to administer justice efficiently and securely. However, this reliance brings heightened cybersecurity risks, necessitating robust defense mechanisms to protect sensitive data and maintain the integrity of judicial processes. Listen to experts from Zscaler and CrowdStrike in this comprehensive on-demand recording designed specifically for...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.