F5 GuidePoint Capture the Flag
The F5 and GuidePoint teams hosted an interactive Capture the Flag competition where attendees competed against others to hunt for API vulnerabilities and learn how they work. In this lab and Capture the Flag exercise, attendees learned how to identify and mitigate:Hard-Coded Secrets: Many applications exchange user credentials for a hard-coded token or key. This key allows anyone who knows it to gain access to the application however, many ti...
In-Building Connectivity for Return-to-...
Experts from Verizon, Ericsson, Leidos & Carahsoft discussed how 5G, private networks, and scalable solutions can support both civilian and defense operations, ensuring secure, efficient and future-ready connectivity.
RTO Realities - Optimizing Employee Pro...
Carahsoft and Riverbed joined for an interactive webinar featuring Riverbed's Federal CTO Bill Robers, as he shares strategies to optimize IT operations and enhance government efficiency.Attendees learned:Strategies to monitor network activity, pinpoint performance issues, and gain deeper visibility into application and user experienceHow to track increased network and application usage, detect latency, and optimize IT performance as in-office...
Building Resiliency Across Your Endpoints
Ransomware attacks often go undetected for months or even years, with attackers escalating privileges before striking. This makes real-time endpoint visibility more crucial than ever, especially in today’s work-from-anywhere environment. Absolute Security and Forescout discussed how their partnership can help you stay ahead of threats. Together, they offer a powerful solution: the Absolute Connector for Forescout eyeSight, which integrat...
Advancing Data Quality and Maturity in...
Public safety agencies operate in an environment where data integrity, accessibility, and validation are crucial—especially when operating under a consent decree. As expectations rise around data transparency and accountability, law enforcement must embrace tools that help build a solid data foundation while making analytics accessible across the agency. This webinar explored how the Albuquerque Police Department, under the leadership of...
AI for Government Summit 2025
The AI for Government Summit brought together government leaders, policymakers, technology innovators, and industry experts to explore the transformative impact of artificial intelligence in the public sector. As the premier event of its kind, the summit served as a platform for showcasing cutting-edge advancements and discussing strategies to address the unique challenges and opportunities AI presents in governance. Attendees explored real-wo...
Harnessing Data for Impact: Acceleratin...
Individuals and families experiencing a housing crisis often face additional barriers due to disconnected systems and a lack of real-time visibility into available shelters and services. Without seamless data integration across platforms used by members in a continuum of care, organizations struggle with limited insight into shelter capacity, difficulty matching services to client needs, unsecure client data, and a lack of data-driven insights...
Strategies for Navigating the Future of...
This webinar explored the 3 key strategies that public sector organizations must adopt to secure their digital services and ensure positive, authentic citizen experiences in the face of evolving bot threats.In this session, thought leaders covered:Understanding the Threat: Explore how public sector organizations can effectively balance robust bot defense with the need to offer smooth, user-friendly interactions for citizens.Combating Bot Activ...
Streamlining the User Experience for St...
Thank you for joining our discussion on the Arizona Department of Economic Security’s new A to Z Portal. We hope you enjoyed learning how AZ DES, Salesforce, and ID.me collaborated to create a secure, seamless, and citizen-focused digital experience. Stay tuned for the on-demand recording and additional resources to continue your digital transformation journey.
Data Security Made Simple: How Best-of-...
During this session, we discussed how Agentless Data Protection and Key Management Solutions can work together to strengthen your security posture. We explored the pitfalls that lead to breaches and best practices to protect your organization. View the recording to hear our expert speakers, Ed Reynolds, Senior Product Manager at Entrust, Bob Lam, CEO and Co-Founder, ShardSecure, Inc., and Jesper Tohmo, CTO and Co-Founder, ShardSecure, Inc. Ke...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.