Zoom for Government Webinar Series - Ma...
Zoom for Government is for your mission. We enable the federal mission through an easy-to-use and innovative collaboration platform. Watch our March sessions on-demand exclusive to the public sector!
Built for Government: How Embedded Endp...
Did you know that Absolute’s endpoint security solution is embedded directly into government-used device firmware, offering unique advantages for enhancing control, resilience and compliance?In this session, we explored how agencies use Absolute to:Enforce robust security policiesDetect and recover from IT disruptionsStrengthen cyber resilience with persistent endpoint monitoring, automated repairs and geofencing for secure operations
Building Accessible Dashboards
This insightful webinar was on the art of creating accessible data visualizations. Key principles for designing dashboards that cater to a wide range of user needs were taught, ensuring that everyone can see and understand data effectively. In addition to these best practices, we took a tour of the latest and upcoming Tableau features on accessibility, highlighting the enhanced usability experiences.During this webinar, attendees learned:Essen...
Omnissa Partner Day
Those who joined us at our Omnissa Partner Day were able to attend our various sessions, meet with our representatives, and close the night with a happy hour.By attending our sessions, attendees got the opportunity to hear about topics like:Discovering Omnissa: Our Story, Mission, and VisionUnlocking Growth: How Omnissa Empowers PartnersPartnering with Omnissa: Strategies, Benefits, and Success in the Channel
How to Enforce Least Privilege Across E...
Endpoint security serves as the frontline defense in protecting your institution’s network from a wide array of threats originating from devices that connect to the enterprise network, such as laptops, smartphones, and tablets. These endpoints are often the targets of cyberattacks as they provide access points to the organizational network, making them vulnerable to malware, ransomware, and more. By securing these endpoints, institutions...
Maximize Cloud Security with AWS and Wiz
This webinar explored how AWS's built-in security tools and Wiz's Cloud-Native Application Protection Platform (CNAPP) work together to enhance cloud security. AWS services like Config, Security Hub and KMS provide a strong foundation for visibility, compliance and monitoring, helping organizations track resource changes, centralize logging and manage encryption. In this session, we showcased how Wiz extends AWS's capabilities, delivering deep...
Fortifying the Future: Protecting 3rd a...
As supply chains become increasingly digital and interconnected, cybersecurity risks from partners and suppliers are evolving at an alarming pace. Cyberattacks targeting 3rd and 4th party supply chain networks—ransomware, data breaches, and third-party vulnerabilities—can have devastating consequences on your company. With more Governments looking to increase regulations to ensure organisations secure 3rd and 4th party providers, o...
2025: DFARS Part 210, Market Research
Join Washington DC based, Jennifer Schaus & Associates in the 2025 Webinar Series covering The DFARS, Defense Federal Acquisition Regulations Supplement. This series features guest speakers who will uncover the important details and nuances of The DFARS. Get educated about the rules and regulations in the game of federal contracting. This series is COMPLIMENTARY & RECORDED. Recordings are posted on our YouTube Channel. CORPORATE SPONSO...
AI on Your Terms: Scalable & Secure Sol...
Your AI journey is only just beginning. Learn how adopting advanced artificial intelligence solutions can drive faster problem-solving, improve decision-making and deliver meaningful results for your organization with Red Hat OpenShift AI. Watch this recording for an in-depth discussion on Red Hat OpenShift AI and how it can help: Reduce AI Infrastructure Management: Enable teams to focus on data exploration and app development with on-demand...
Community Templates Technology with Clariti
In this on-demand webinar Clariti shares a game-changing new cloning feature that allows you to replicate other organizations’ permit-type configurations to save time. They'll show you how easy it is to clone thousands of best practice permit types, rules, steps, and workflows built by leading cities and counties like Placerville CA, Albany NY, Melissa TX, and more. You'll learn how Community Templates works, and how you can:Increasing i...
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.