Back to Search Begin New Search Save Search Auto-Notify
govDelivery Advanced Bulletin Training...
We offer weekly live training sessions for the most commonly used features in govDelivery. These training sessions last roughly an hour and are conducted by a member of our Training Team. Using GotoWebinar, you'll be able to view the computer screen of our training leader as they walk you through important tasks and functions within govDelivery. If you register for a session, but can't attend, that's OK! Please feel free to sign up for another...
April 30, 2020
Organizer: Granicus
Location: Webcast
Add Favorite
Device Provisioning at Scale
Device provisioning at scalePart 3 of the Azure training series, Build end-to-end IoT solutionsThis portion of the workshop walks through a hypothetical asset-monitoring solution that requires IoT devices with sensors for tracking location, temperature, and pressure to be placed in product transport boxes. When a new box enters the system, it is equipped with the new IoT device. The device needs to be auto-provisioned to the IoT hub using Azur...
April 30, 2020
Organizer: Microsoft Azure
Location: Webcast
Add Favorite
Secure your Azure and Hybrid Cloud usin...
To fully embrace the cloud, businesses need to understand where the balance of responsibilities lies between protecting the cloud infrastructure, which is the responsibility of the cloud provider, and protecting the data that resides in the cloud, which is the responsibility of the customer. This is what cloud providers refer to as the shared responsibility model. Please join us in this webinar co-hosted by Microsoft and Check Point to learn a...
April 30, 2020
Organizer: Microsoft
Location: Webcast
Add Favorite
Secure your Azure and Hybrid Cloud usin...
To fully embrace the cloud, businesses need to understand where the balance of responsibilities lies between protecting the cloud infrastructure, which is the responsibility of the cloud provider, and protecting the data that resides in the cloud, which is the responsibility of the customer. This is what cloud providers refer to as the shared responsibility model. Please join us in this webinar co-hosted by Microsoft and Check Point to learn a...
April 30, 2020
Organizer: Microsoft
Location: Webcast
Add Favorite
Tableau Learning Series: Introduction t...
This is a foundational presentation to show the scope of Tableau. At the end of this presentation, the attendees will learn how easy it is to create maps with just a mouse click. Attend this live webinar from Tableau to: Learn the core Tableau Mapping functionality Discover how Tableau reads data and assigns geographic roles to map data that is locked away in tables Understand how companies might have specific geographies that need mapping; st...
April 30, 2020
Organizer: Tableau Team at FedResults
Location: Webcast
Add Favorite
Data Breaches: Defending Against and Re...
It is not a matter of if, but when your organization will be breached. Against these threats, enterprises try to build higher and more secure walls around their data and networks. This seems to be a never-ending arms race, as even the most sophisticates systems may, before long, present weaknesses that malicious technology can overcome. What You Will Learn In this one day conference attendees will learn: Now What? WFH – How Do We Adapt a...
April 30, 2020
Organizer: Camp IT Conferences
Location: Virtual
Add Favorite
Continuity of Operation Planning
With any organizational crisis, Continuity of Operations Plans are more important than ever. A realistic COOP plan allows for state and local governments to continue to provide the critical services citizens depend on every day. Please join us as we discuss things to consider in developing and executing an effective COOP plan and it’s applicability to current emergencies.
April 30, 2020
Organizer: Dell Technologies
Location: Webcast
Add Favorite
Investigation & Threat Hunting Virtual...
The surge in advanced attackers has created a need for SecOps to understand, quickly respond to and hunt the most sophisticated threats inside your organization. Join this 3 hour hands-on investigation and threat hunting virtual workshop to boost your skills and learn how to use Cortex XDR to stop sophisticated attacks by: Creating custom rules to alert on suspicious behavior Accelerating threat hunting with enriched, contextualized data Quick...
April 30, 2020
Organizer: Palo Alto Networks
Location: Virtual
Add Favorite
Protect Texas Elections: Cyber Security...
Election security is a top priority for Texas officials as they continue to leverage forward-thinking cyber security measures to improve our state's election systems. Join FireEye for an informational webinar to learn more on how to further safeguard our elections infrastructure against malicious cyber activity. This session will both share those best practices and offer insight into how local officials can secure their elections. Can't make t...
April 30, 2020
Organizer: FireEye Government Team at Carahsoft
Location: Webcast
Add Favorite
McAfee Center Stage: Review, Examine, a...
IT security threats are constantly evolving. In today’s world, these threats can be challenging and even devastating to your company’s reputation and economic well-being. As the security architecture continually evolves, organizations often have disconnected strategic security goals, processes, policies, and technologies, leading to increased vulnerabilities. Join McAfee experts, Dr. James Fraley and Mr. Zachary Krider, who will sh...
April 30, 2020
Organizer: McAfee
Location: Webcast
Add Favorite
Back to Search Begin New Search