Detect and Respond to Threats with Rapi...
As organizations continue their cloud & digital transformation efforts, we are finding that security teams have become more inundated with endless alerts from an ever-evolving threat landscape. During this webinar, Rapid7's Threat Intelligence Specialist, Richard Serna dove through their Threat Command platform. During this on-demand webinar, he discussed how to: Detect and respond to threats in real-time Improve your overall security post...
Mastering the DoD Zero Trust Journey: B...
In a rapidly changing digital landscape, federal agencies face a constant battle against cyber threats. With the stakes higher than ever, you need a strategic advantage to safeguard your agency's sensitive assets and ensure the resilience of the Department of Defense network environment. Embracing the DoD Zero Trust Strategy is the key to unlocking this potential and positioning yourself as a hero in this evolving story. View the engaging webi...
Digital Cognitive Behavioral Therapy in...
In this webinar, Ted Green, Co-Founder of eHawk Inc., Dr. Johnathan Ward, Managing Director of Breaking Free, and Glyn Davies, Service Development Director of Breaking Free, discussed the implementation of mobile Cognitive Behavioral Therapy (CBT) for addiction and mental health in pre-trial, probation, and parole settings, including treatment courts and juvenile programs. eHawk’s RePath mobile supervision program is designed to enhance...
Bridging Borders: How AI and Public Inf...
This webinar brought together border security and artificial intelligence (AI) experts to explore best practices for integrated border management, with a specific focus on the use of AI and publicly and commercially available information sources to detect and prevent cross-border crime. Participants learned: How AI can improve the effectiveness of border management systems in a myriad of ways, such as by increasing the accuracy of name matchin...
Mission First: Public Sector Podcast Series
Listen on-demand to episode three of our podcast series dedicated to covering the latest and greatest in IT achievements - keeping you ahead of the competition. Hear from Elizabeth Cappello, Deputy Chief Information Officer (CIO) for the Department of Homeland Security (DHS), and Craig Bowman, Senior Director - Federal for VMware, who will discuss: Meaningful implementation of Artifical Intelligence (AI) in cybersecurity How to view open stand...
Accelerate Your Datacenter Evacuation w...
During this on-demand workshop, subject-matter experts discussed: How VMC on AWS can accelerate datacenter evacuations Procurement and certifications How VMware Cloud works VMware Cloud use cases
The Craft of Creating Virtual Experiences
Watch Adobe’s 3-part on-demand webinar series, The Craft of Creating Virtual Experiences, with Adobe Connect Evangelist, Alistair Lee. Each on-demand webinar focuses on a different component of designing your virtual meetings, events, and trainings to maximize effectiveness and showcase how to leverage the full capabilities of Adobe Connect. Fill out the form below the table to access the session recordings, available slide decks, and he...
Tech on Tap: F5 Future Proofing Your Ap...
APIs are the lifeblood of the internet today. Everything from booking flights to reading your daily newsfeeds is all made possible by the growth of data sharing using Application Programming Interfaces (APIs). With the growth of modern applications, developers often unintentionally leak sensitive datasets. The proliferation of APIs has marked them as a prime target for malicious actors and nation-states leaving the DoD and the War Fighter vuln...
Internal Mobility: Talent Acquisition a...
To address the unique challenges faced by government organizations, it is imperative to prioritize the development and retention of existing employees through robust internal hiring processes and career development pathways. Watch LinkedIn's webinar and demo to learn how LinkedIn's Internal Mobility features, seamlessly integrated within our Hiring + Learning solutions, provide an "internal" lens to the tools government professionals already u...
Kickstart to Compliance Series: Step Tw...
Join us for the next session of our Kickstart to Compliance webinar series covering the second step on your journey toward achieving ZTA data pillar optimal level. To comply with federal mandates and protect sensitive data, agencies must develop an approach to identify and prioritize data protection needs. This includes understanding the different techniques for field and record level protection, such as encryption, persistent data masking, d...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.