Back to Search Begin New Search Save Search Auto-Notify
Zero Trust & SecOps Automation: The Fut...
Department of Defense (DoD) agencies are taking concrete steps to transition to a zero-trust architecture to protect critical data and systems. Transitioning to a zero-trust architecture requires a fundamental reimagining of security operations centers (SOCs) and teams. SOCs have traditionally been structured around the role of the security operator, rather than the data and lacked both automation and DevOps practices. To establish a true zero...
Add Favorite
Salesforce Los Angeles Innovation Day
Attendees joined us on Tuesday, June 20th, for a day of collaboration between Los Angeles agencies, exploring how revolutionary technology platforms easily integrate with current infrastructures- enabling automation, collaboration, mobile, and rapid response to change! Thank you to our sponsors: Box, Tanium, AWS, Cloud Creations, Deloitte, Slalom, Publicis Sapient, AST, Launchpad, StackNexus, and Accenture. Register to view this on-demand reco...
Add Favorite
Enhance Developer Productivity with VMw...
Attendees of this webcast learned how VMware Tanzu on AWS EKS can: Develop applications with single sign-on authentication Get air-gapped support for high compliance, disconnected environments Build a great developer experience on AWS Accelerate your app development while providing the best DevSecOps experience Register to view this on-demand recording.
Add Favorite
Go Beyond IAM: Implementing IGA to Miti...
During this Pathlock and Carahsoft webinar, attendees heard from top security experts on how you can expand your SAP security strategy to layers below the network to include vulnerability management, dynamic authorization (zero trust), and data loss prevention - all from a single platform. Register to view this on-demand recording.
Add Favorite
The Power of Tableau Core-Based Server
Tableau offers core-based and role-based licensing to consume data. Each licensing model offers its own benefit. During this session, attendees will discover: How you can deploy Tableau Server (core-based) implementations to take maximum benefit Use cases for core based license consumptions Must-haves, have-nots Tips to make your core based server implementation a success Register to view this on-demand recording.
Add Favorite
Mastering the DoD Zero Trust Journey: B...
In a rapidly changing digital landscape, federal agencies face a constant battle against cyber threats. With the stakes higher than ever, you need a strategic advantage to safeguard your agency's sensitive assets and ensure the resilience of the Department of Defense network environment. Embracing the DoD Zero Trust Strategy is the key to unlocking this potential and positioning yourself as a hero in this evolving story. View the engaging webi...
Add Favorite
Mission First: Public Sector Podcast Series
Listen on-demand to episode three of our podcast series dedicated to covering the latest and greatest in IT achievements - keeping you ahead of the competition. Hear from Elizabeth Cappello, Deputy Chief Information Officer (CIO) for the Department of Homeland Security (DHS), and Craig Bowman, Senior Director - Federal for VMware, who will discuss: Meaningful implementation of Artifical Intelligence (AI) in cybersecurity How to view open stand...
Add Favorite
The Craft of Creating Virtual Experiences
Watch Adobe’s 3-part on-demand webinar series, The Craft of Creating Virtual Experiences, with Adobe Connect Evangelist, Alistair Lee. Each on-demand webinar focuses on a different component of designing your virtual meetings, events, and trainings to maximize effectiveness and showcase how to leverage the full capabilities of Adobe Connect. Fill out the form below the table to access the session recordings, available slide decks, and he...
Add Favorite
How to Resist Ransomware
Hear from federal cyber leaders at DOD and CyberArk on the best tips, tricks and strategies for resisting ransomware and protecting federal data. Ransomware attacks against federal IT systems surged to unprecedented levels at the beginning of the COVID-19 pandemic and show no sign of abating, with ransomware losses surpassing $1 billion in the second half of 2021. Federal agencies handling mission-sensitive medical, financial, demographic and...
Add Favorite
Kickstart to Compliance Series: Step Tw...
Join us for the next session of our Kickstart to Compliance webinar series covering the second step on your journey toward achieving ZTA data pillar optimal level. To comply with federal mandates and protect sensitive data, agencies must develop an approach to identify and prioritize data protection needs. This includes understanding the different techniques for field and record level protection, such as encryption, persistent data masking, d...
Add Favorite
Back to Search Begin New Search