Introduction to Advanced Analytics with...
View an interactive Alteryx session on conducting end-to-end analysis. To start off, they unpacked how federal, state, and local agencies are utilizing data driven approaches to enhance their operations, including reconciliation, risk assessment, and data deduplication. After a brief introduction to the possibilities, they went hands-on and learn how to apply these techniques. You will learn how to bring in and merge different sources of data...
Design & Implementation of Zero Trust A...
The Castle and Moat doctrine for IT information security is officially dead, and Zero Trust Architecture (ZTA) is the new method for securing information resources. Zero trust provides an approach to identity and access management that assumes no user or software is trusted by default. All users, devices, and applications must prove their identity and level of authentication before accessing resources. Key thoughts on this approach are never t...
Engaging the Public with Zoom for Government
As governance plans evolve, engaging the public has never been more vital. Government digital services are leveraging new modes of hybrid communication to reach the public, including media, events, and webinars. Whether hosting city council meetings & town halls, conducting virtual hearings, or convening healthcare briefings, Zoom for Government (ZfG) is the platform for today’s government communications. In this webinar, attendees d...
Siren 13: High Fidelity Reports, 2x Sea...
The Siren 13 platform is now twice as fast with a simplified interface to allow for a better analyst experience. This improved search speed along with advanced features such as category icons will provide an overall better analyst experience with better intelligence products. Watch the on-demand webinar where we demonstrate the Siren 13 platform's new features and how they can improve the user experience (UX) of investigators. Investigators no...
Breaking Free from the Technical Debt Trap
Technical debt is an accumulation of inefficiencies and vulnerabilities due to the way in which solutions and technologies are assembled to address specific problems in a "good enough" manner. Technical debt is a reality in all IT environments and often requires significant resources to address. It will often create more debt as security gaps are plugged in an acceptable, but suboptimal way. One of the largest sources of technical debt is Poin...
Building a Healthy Agency with Well-Bei...
We spend most of our waking lives at work; our roles as community servants are more demanding, reactive, and challenging than we’ve experienced before. Research shows that when we bring our whole selves to work, we’re more creative and perform better. In order for employees to thrive, leaders must provide a transformative and engaging experience for their employees. That's a tall order to fill, but there are ways to leverage scienc...
Tackling the Zero Trust Challenge with...
View this on-demand recording to discover what attendees learned during our Zero Trust webinar, topics including: Why Zero Trust security is important for Critical Infrastructure How to communicate the value of Zero Trust in OT to key business decision makers A simple and scalable methodology for analyzing and planning Zero Trust protection Tools to implement Zero Trust controls in OT brownfields and converged IT/OT environments How Zero Trust...
Go Beyond Salesforce Reporting
Attendees joined this webinar to understand the basics of Salesforce Reporting and when it makes sense to enhance analysis with Tableau. During this on-demand session, attendees uncovered: Key differences between Salesforce Reports and Tableau How to get started using Tableau with Salesforce data How to get data driven insights faster using Tableau Accelerators How to embed Tableau into their Salesforce environment
An Introduction to Easier Automation wi...
Regardless of where you are in your IT modernization journey, creating an enterprise-wide approach to automation can help you optimize not only IT processes, but also entire technologies, teams and organizations. Red Hat Ansible provides an enterprise framework for building and operating IT automation at scale, from hybrid cloud to the edge. Ansible Automation Platform enables users across your organization to create, share and manage automati...
Transforming External Collaboration: Se...
Are you looking for a secure and efficient way to share files stored in SharePoint Online and OneDrive with external organizations? Do you want to increase user productivity and get a better return on your investment in O365? If your answer is yes, then we invite you to watch the on-demand recording. eShare is a secure external sharing technology that is being used by agencies like the USPS OIG to securely share files with external agencies an...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.