Back to Search Begin New Search Save Search Auto-Notify
Transform Fraud Prevention: From Legacy...
Federal finance administrators face the critical challenge of balancing strong security with seamless user experiences amid evolving cybersecurity threats. This webinar explored how Splunk and ID.me's advanced data analytics and digital identity verification can revolutionize pension program security and operations. Experts discussed human-centered design strategies that enhance fraud prevention while ensuring frictionless services access. Dur...
Add Favorite
Salesforce Lunch & Learn for Los Angele...
Our 3rd Los Angeles Lunch & Learn session was a success. Public Sector agencies gathered to virtually explore the digital transformation that happening in the county. Attendees learned practical tips to customize the platform so that processes are streamlined and efficient.
Add Favorite
Flexible Log Management for Government
As government agencies scale their IT modernization initiatives and deepen their focus on security, managing and maximizing the value of growing log volumes becomes more challenging. This is in addition to complying with logging requirements outlined in mandates such as M-21-31. Attendees joined Datadog as they explored how to collect, process, and store large machine-generated data sets, transforming them from noise into actionable intelligen...
Add Favorite
From the Frontlines: Lessons learned fr...
Deploying Zero Trust for an Operational Technology network differs from deploying it on an IT network. Dragos and BlastWave have learned hard lessons with customers on the best practices for deploying OT Zero Trust in the real world and shared these lessons with attendees. They also explored how the pillars of the multiple OT cybersecurity frameworks (NIST, DoD, NIS2, etc.) are combined to provide a deployable solution for critical OT networks...
Add Favorite
Enhancing Homeland Security Operations...
In today's fast-paced digital environment, the Department of Homeland Security (DHS) faces complex challenges in maintaining robust IT operations and ensuring the security of critical infrastructure. This webinar included the transformative potential of Splunk IT Service Intelligence (ITSI) to streamline and enhance IT operations within DHS. Participants joined us as we explored how Splunk ITSI’s advanced analytics, machine learning capa...
Add Favorite
Transform Your Printing Operations - Tu...
Participants joined the Tungsten Automation webinar to learn more about how Printix could transform their printing operations and unlock new possibilities for their business. Printix was introduced as a cloud-based print management solution that offered a comprehensive print infrastructure and secure printing environment. It was designed to enhance efficiency, productivity, and cost savings for businesses of all sizes. By eliminating the need...
Add Favorite
Mastering Enterprise Agile with ServiceNow
In an era where missions evolve at lightning speed, staying ahead requires more than just quick thinking - it demands agile planning and flawless execution. The stakes have never been higher for agencies and commands to adapt swiftly and ensure their teams are prepared and empowered with cutting-edge tools and strategies. This dynamic discussion helped attendees elevate their Agile game. They learned how they can transform their Agile delivery...
Add Favorite
Navigating UCaaS Migration: A Strategic...
We wrapped up an insightful webinar featuring Zoom and Packet Fusion, where public sector leaders explored the transformative potential of Zoom’s integrated UCaaS (Unified Communications as a Service) platform for State, Local Government, and Education (SLED) organizations. The session highlighted how Zoom’s UCaaS seamlessly integrates voice, video, messaging, and file sharing, enabling teams to communicate effortlessly across depa...
Add Favorite
Navigating the Complexities of Multimed...
The growing volume of digital evidence, like CEM and CSAM, can make identifying and preserving crucial information overwhelming. Our upcoming webinar will provide strategies to streamline your workflow and leverage advanced tools like filters and quick video frame previews to speed up evidence review and improve accuracy. Access this on-demand webinar recording to learn how cutting-edge digital forensics can transform your investigative proces...
Add Favorite
Foundation to Security: Verifying Compo...
In today’s rapidly evolving digital landscape, the security of your IT infrastructure and endpoint devices begins long before systems reach your facility—starting with the integrity of the supply chain. From the moment components are assembled into systems, maintaining traceability and transparency is critical to ensuring that your agency operates with trusted computing systems. This webinar covered the following topics:The essenti...
Add Favorite
Back to Search Begin New Search