Back to Search Begin New Search Save Search Auto-Notify
Operationalizing Zero Trust: NIST and B...
Over 15 years since its initial conception and more than three years since the U.S. federal government made it a fundamental tenet of its overall cybersecurity strategy, Zero Trust has only become more important as a strategic framework for government and critical infrastructure alike. While the imperative to implement Zero Trust has been well established, the question of “how” is less clear. Enter NIST and the National Cybersecuri...
Add Favorite
The History of Seepage Technology Development
A historical timeline will be presented that describes the significant seepage-related failure case histories and how various technology developed for seepage analyses and evaluations, including potential failure modes. The history of seepage technology begins in the 1800's but accelerates in the early 1900's and through the late 1980's. Each critical milestone in the evolution of seepage technology will be identified along with key published...
Add Favorite
How to Engage with CIOs
In this exclusive partner webinar, Ted Brodheim, former CIO and current Global CIO Advisor at Zoom Communications, shared his expert perspective on successfully engaging with Chief Information Officers (CIOs).In this session, Ted provided Zoom resale partners with a deeper understanding of what CIOs prioritize when purchasing technology, how they navigate the buying process, and how to foster strong relationships with these key decision-makers...
Add Favorite
HHS IT Simplified: Why Automation Matte...
Red Hat and Carahsoft hosted an HHS exclusive webinar on February 12th on a technical overview of Red Hat Ansible Automation Platform. This session explored:Key features and capabilities of Ansible tailored for HHS needsBest practices for scalable IT automationThe latest updates and enhancements in Ansible Automation Platform
Add Favorite
Use Cases in Threat Intelligence: Turni...
Attendees gained essential insights on modern cyber threats with experts from Google Public Sector and August Schell. The session explored the latest trends and emerging threats targeting U.S. Navy operations, aimed at strengthening cybersecurity and enhancing maritime security. Highlights included:A detailed overview of the current cyber threat intelligence and emerging trends targeting the U.S. public sector.Insights from Mandiant's latest t...
Add Favorite
Beyond the Generative AI Hype: Practica...
Experts shared insights on how Generative AI had been a transformative technology capable of revolutionizing public sector services by enabling AI agents to:Simplify communication by understanding everyday language.Converse with residents in their preferred language.Gather complete information through straightforward questions, reducing delays.Recommend relevant services for review and approval.Autocomplete paperwork using existing documents.H...
Add Favorite
PQC Migration: Where Are We Now?
Recent announcements from the likes of NIST, Gartner, and Google have highlighted the importance of post-quantum cryptography. These announcements have increased the sense of urgency for PQC migration. Given that PQC migration is a long-term and resource-intensive task, many are asking where the cryptography industry stands at this point. They want to know how they should be managing their PQC migrations, what kinds of tools they will need to...
Add Favorite
Easy and Quick Determination of the PMF...
This webinar will provide training on using the PMP to generate the PMF, including a walk-through of the rapidly evolving US Army Corps of Engineers HEC-HMS and HEC-RAS modeling processes to transform rain into runoff. The methodology was updated in 2023-2024 based on major software improvements and is cutting-edge. This webinar will include both theory and case study examples. This is Part II of a webinar by Bill Kappel related to the develop...
Add Favorite
AI and Automation in Action: Transformi...
Dynatrace and Red Hat hosted an NIH and CMS exclusive webinar on February 18th, tailored specifically for government leaders in the healthcare sector. This session explored how AI and automation drive transformative for NIH and CMS.During this session, attendees:Learn how AI-driven automation can optimize event-driven systems to enhance operational efficiency and patient care.Discover practical insights on streamlining IT infrastructure and wo...
Add Favorite
Next-Gen SOC at the Forefront
Recently, SOC Prime and Carahsoft hosted an exclusive webinar on the future of cybersecurity operations centers (SOCs). Participants discovered how next-gen SOCs empowered enterprise and MDR-focused organizations to stay ahead of evolving threats and minimize the risk of breaches by harnessing the power of cutting-edge technology, advanced automation, and community-driven threat intelligence.
Add Favorite
Back to Search Begin New Search