What You Need to Know About the Uniform...
The Office of Management and Budget just made a host of important updates to Uniform Grant Guidance (Title 2 CFR), which go into effect on November 12, 2020. Failure to comply with the latest requirements could mean audit findings and more headaches for governments who cannot afford additional delays during such a critical time. Join this complimentary webinar to learn: The latest updates to Uniform Grant Guidance Federal expectations and req...
Captivating Video Editing with Adobe Pr...
Communicating with citizens and employees is a critical function of government agencies, from emergency response to educating the public on agency processes. The National Aeronautics and Space Administration (NASA) was able to produce a successful video series using the industry-leading video editing software, Adobe Premiere Pro. Video communication makes NASA's scientific content more approachable even when the subject matter is highly techni...
Mitigating Business Email Compromise an...
Email fraud leads to two main threats - one is Business Email Compromise (BEC) where attackers pretend to be you; the other one is Email Account Compromise (EAC) where attackers become you. BEC/EAC scams have cost the victimized organizations over $26 billion since 2016. What they have in common is that they both target people.They both rely on social engineering and are designed to solicit fraudulent wire transfers or payment. Unlike malware...
Orchestration & Automation for Lockheed...
Security and IT Ops teams are working hard identifying, analyzing, and mitigating threats facing their organizations. Splunk gives you the full power of orchestration, automation, and response to executing actions in seconds, not hours. Join us to learn how Splunk Phantom can help your team achieve optimum security and IT operations regardless of what security tools or SIEM you're using. Through Splunk Phantom, users will be able to leverage t...
Rethink Your Approach to Cybersecurity
Federal departments and agencies employ millions of personnel to carry out the missions and functions that the American public relies on for its well-being. The IT systems and networks of the Federal government continue to be attractive targets for foreign intelligence services and other malicious actors. As the threat landscape changes and attacks become more human-targeted, it's crucial to understand the data your users have access to and ho...
How Tribes Can Make the Most of Availab...
With nearly all COVID-19 relief funds distributed, many tribes may be left wondering where else they can go if they are in need of additional support.In this complimentary webinar, eCivis will cover the latest federal grant guidelines that tribes should be aware of, along with best practices to manage the influx of funding.Join to learn:The latest updates to Uniform Grant Guidance and how it affects tribesThe most recent grant programs and ava...
Preconfigured Containers for Remote Dev...
Advances in cloud infrastructure and Kubernetes container orchestration have led to new tools for seamless communication and monitoring across academic institutions. Red Hat CodeReady Containers brings a preconfigured OpenShift cluster to your laptop or desktop for development and testing purposes in a remote IT environment. Join Red Hat on Thursday, October 1st, to learn how your school system can leverage the agility of containers in a light...
Business Architecture: Strategy Executi...
Failure to execute strategy is the most significant management challenge facing public and private organizations in the 21st century. In fact, according to economist Michael Porter, more than 80% of organizations do not successfully execute their business strategies and in 70% of these cases, the reason is not the strategy itself, but bad execution. Most organizations have a strategy, but few are able to align strategic objectives and tactical...
Take NASA's Security to the Next Level...
During these times, agency frontline workers, help desk, and support teams have gone remote. So, what has Splunk done to address what agencies can do to better facilitate personnel productivity for these teams who are charged with ensuring mission continuity, application security, and availability? Join us for a series of on-demand webinars that are designed to introduce you to the Splunk ecosystem and provide you with a deeper dive into how i...
Go with the Flow - Building Sustainable...
Security teams are working hard identifying, analyzing, and mitigating threats facing their organizations. Splunk Phantom allows you to harness the full power of your existing security investment with security orchestration, automation, and response. With Splunk Phantom, you can execute actions in seconds, not hours. View our on-demand presentation and demo with Splunk and SGT on the power of Splunk Phantom's workflow engine. During the presen...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.