Back to Search Begin New Search Save Search Auto-Notify
Securing Digital Identities in a Changi...
Attendees gained:Insights from industry experts on the evolving cybersecurity landscape and federal regulationsBest practices for implementing phishing-resistant MFA and passwordless authenticationInteractive discussion with peers and thought leaders on the challenges and opportunities in federal IT security
Add Favorite
Government Legacy IT Modernization: Ove...
In today's fast-paced digital landscape, the need for government agencies to modernize their outdated systems is more critical than ever. Legacy technology not only hinders operational efficiency but also limits the ability to meet the evolving needs of citizens. How can agencies ensure their platforms remain agile, cost-effective and future-ready?During this webinar, attendees explored the innovative strategies to modernize legacy systems in...
Add Favorite
Modern Software Delivery for Government...
Federal agencies, currently under pressure to deliver software quickly with smaller staff and tighter budgets, need tools that help them move faster while staying in control. Traditional deployment methods often bring unnecessary risk and delays, making it harder to respond quickly to critical mission demands.LaunchDarkly & Carahsoft hosted an insightful session about how feature management is revolutionizing software delivery for governme...
Add Favorite
FedRAMP Authorized: Take Action with th...
During this webinar, attendees learned about: How Axonius Federal Systems has successfully achieved FedRAMP Moderate Authorization, ensuring that federal agencies can deploy the Axonius Asset Cloud with confidence.How the Axonius Asset Cloud provides a unified, up-to-date inventory of assets across multi-environments, empowering agencies to gain insights and streamline risk management.How Axonius drives operational efficiency by automating ass...
Add Favorite
Create Striking Motion Graphics with Po...
At last year's Adobe MAX Creativity Conference, guests got an exclusive look at the future of Adobe Creative Cloud. Attendees were treated to awe-inspiring demonstrations of the latest innovations in Adobe After Effects, the industry-standard motion graphics and visual effects software—powered by the cutting-edge capabilities of Adobe Firefly Artificial Intelligence (AI). Watch our complimentary on-demand webinar to dive into the newest...
Add Favorite
Smarter IT for State & Local Government...
In this webinar, RavenTek's Ryan Coleman and Zach Holloway discussed how government leaders utilize ManagedDEX, a digital employee experience (DEX) solution that reduces downtime, accelerates troubleshooting, and supports digital transformation. Attendees learned how to:Proactively resolve issues to minimize disruptions and improve user experienceEmpower IT teams with AI-driven, proactive operations and continuous monitoringModernize and optim...
Add Favorite
Endpoint Security in Higher Education:...
Higher education institutions face an increasingly complex threat landscape, with endpoints—laptops, mobile devices, IoT, and research systems—being prime targets for cyberattacks. As IT professionals, securing these diverse endpoints while maintaining academic accessibility is a constant challenge.This webinar explored advanced endpoint security strategies, including Zero Trust architecture, Endpoint Detection and Response (EDR),...
Add Favorite
Securing IT/OT Convergence: Lessons fro...
The convergence of IT and OT within the Department of Defense (DOD) and the federal government presents unique cybersecurity challenges, particularly in protecting critical infrastructure and industrial control systems. As highlighted in the latest CrowdStrike Global Threat Report, adversaries are increasingly targeting operational technology environments, exploiting vulnerabilities in industrial control systems and the Extended Internet of Th...
Add Favorite
Next Generation HSM: Modernize Security...
How much is your legacy Hardware Security Module (HSM) infrastructure holding you back? Legacy HSMs were not designed for the evolving demands of today’s federal IT environments. Burdened by manual operations, limited scalability, and outdated architectures, these systems are costly to maintain, unable to meet the requirements of Zero Trust, and difficult to integrate with modern federal IT strategies. Additionally, many legacy HSMs are...
Add Favorite
F5 API Security Lab Day
The F5 team hosted an interactive Capture the Flag competition where attendees worked with their peers to hunt for API vulnerabilities.In this lab and Capture the Flag exercise, attendees learned how to identify and mitigate: Hard-Coded Secrets: Many applications exchange user credentials for a hard-coded token or key.Broken Authorization: Providing blanket access to the API keys has proven detrimental to multiple mobile and web applications.D...
Add Favorite
Back to Search Begin New Search