Modernizing the Approach to Physical Se...
The physical security threat landscape is evolving once again. From dynamic situations such as protests and civic unrest to more serious cases of workplace violence and threats to personal safety, organizations and government agencies are struggling to meet these demands. These challenges are amplified by budget cuts and limited resources. So, how do leaders and security professionals respond? Advancements in technology are enabling agencies t...
Transforming Public Service: How Geoloc...
How many times during your week or month do you navigate a map to make decisions about things like where you’re going to dinner, your running route, or which dry cleaner is closest to your office? What if finding a government service could be just as user-friendly, in an application that is familiar? During this webinar, Avaap explored how geolocation technology is transforming government services. We investigated the innovative solution...
Unlocking the Power of Symantec SASE fo...
This webinar discussed how Symantec Secure Access Service Edge (SASE) can transform your security strategy, providing seamless protection across all your end-points, users, and applications. Key topics discussed during the webinar include:The evolution of SASE and its role in securing workforcesHow Symantec SASE integrates with existing infrastructures to ensre scalability and flexibiltyDeep dive into Symantec's cloud-delivered security servic...
Accelerating Federal Insights with Auto...
Access this Alteryx & GAI webinar recording to discover how federal agencies can save thousands of hours by automating manual data processes and leveraging advanced analytics. Discover how one agency transformed its operations, achieving efficiency and accuracy with the Alteryx Enterprise Platform.During this webinar, attendeesExplore scalable analytics solutions for federal missions and workflows.Learn how automation replaced 2,000 hours...
Data Management Finally Made Simpler -...
Are you curious about how to transform your data management? Attendees learned how to:How to simplify complex data managementBring together different types of storageIncrease efficiency and unlock new opportunitiesRegister today for this partner session on how to securely manage data across any environment.
ATO in a Day: Lessons from the USMC MCC...
Legacy compliance practices and waterfall acquisition models have hindered mission readiness for years—costing for some over $100K per month, per system and delaying the deployment of critical systems by more than two years. Between 2018 and 2022, only one of five major ATOs achieved a 3-year authorization, frustrating leadership and perpetuating bottlenecks. This fireside chat revealed how the USMC Community Services tackled these chall...
Enhance Your Email Security with Mimecast
In today’s ever-evolving threat landscape, email security is more critical than ever. Attendees of this exclusive demo learned how Mimecast's advanced email security solutions can protect their organizations from the latest threats. View the on-demand recording to learn more about how Mimecast can protect your organization!
Securing the Identity Plane: Enhancing...
As the Department of Defense (DoD) continues its effort towards its zero trust objectives, identity is quickly recognized as the critical foundation to which all of the pillars depend. Unfortunately, identity based attacks are on the rise and present a unique and continued risk to the DoD enterprise. Explore the complexities of the numerous identity planes in an environment and how the native capabilities and integrations between CrowdStrike a...
F5 Capture the Flag
The F5 DISA team hosted an interactive Capture the Flag competition where attendees competed against others to hunt for API vulnerabilities and learn how they work. In this lab and Capture the Flag exercise, attendees learned how to identify and mitigate:Hard-Coded Secrets: Many applications exchange user credentials for a hard-coded token or key. This key allows anyone who knows it to gain access to the application, however, many times these...
The Circle of Viz: Content Promotion Li...
Discover strategies for managing projects, user groups and content permissions to effectively promote and distribute content across your Tableau environment. Learn how to streamline Tableau content management, simplify processes and boost work efficiency. During this webinar, attendees learned:The Key Metrics of Success: Develop a plan and set measures to gauge the success of Tableau content promotion efforts.Site and Project Architecture: Div...
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.