9 webcasts found
+ 171 past events found
Back to Search Begin New Search Save Search Auto-Notify
Configuring for Kids: Making Tech Work...
At Carahsoft, we believe it is time to bring child welfare out of the dark ages of technology. We work with Salesforce to share a powerful proof point: the Accenture Case Insight Solution (ACIS). At this session, the Accenture & Salesforce team will tell a story of how they worked with child welfare stakeholders across the country to articulate how technology can enable caseworkers to get better outcomes for children. Based on that intel,...
Add Favorite
Gain Immediate Transparency Into Your S...
Is your AP team chasing down manual invoices day after day? On August 7th, SAP Concur would like to invite you to join us for our on demand webinar that will cover SAP Concur AP Automation solutions for your school. During this interactive session we will discuss how you can gain transparency into your schools expenditures with a single platform that captures employee spending, when and how it happens. Our experts will share best practices to...
Add Favorite
Making Contracting Simple with DocuSign...
Federal, state, and local governments spend trillions of dollars on contracting and grants every year. Each contract or grant needs to be awarded and obligated by following a highly regulated and complex process. This takes time and involves loads of paperwork. Join our DocuSign webcast to learn how innovated agencies like First 5 are transforming their contracting process with the DocuSign Agreement Cloud to achieve key benefits like: Increas...
Add Favorite
Red Hat Automation Webcast
State, local, and education IT leaders are faced with a difficult dilemma; the need for systems that are secure, automated, and diverse, while remaining within budget constraints. Join Red Hat's featured automation expert, Dan Lemus, as he explores how you can secure your state and local agency or education institution's infrastructure with Red Hat Ansible! During the webcast, Dan will explore how Red Hat's industry-leading enterprise open so...
Add Favorite
CrowdStrike Customer Story - Maine 207
In 2021 there was an 82% increase in ransomware-related data leaks and over 170 adversary groups being tracked for their cyber activity. Every organization is at risk, and due to the data-rich environment, K-12 school districts are considered high-value mines for ransomware groups. Our K-12 meeting featured Don Ringelestein from Maine Township High School District 207, as he explained what to look for in your cybersecurity solution journey and...
Add Favorite
Safeguard M365 Data from Cyber Attacks
Attendees of this webinar explored M365 data defense strategies including: Rubrik tools that cyber-proof M365 data Rapid recovery at scale How to achieve air-gapped, immutable data resilience Register to view this on-demand recording.
Add Favorite
Strategies for Improving Cyber Resilien...
State & Local governments, as well as educational institutions, are struggling to keep pace with advancing technology in the face of rising cybercrime. Only 48% of officials have reported having cybersecurity policies and standards across the country, according to a report by Sophos. With the Biden Administration's $1 billion cybersecurity grant program, it is crucial that State & Local governments and Education institutions are equipp...
Add Favorite
Stop Breaches & Reduce Cyber Risk with...
K-12 and Higher Education organizations are being targeted by threat actors more than ever. In this presentation we discussed the threat landscape and how to leverage threat intelligence, EDR, MDR, and Identity Protection to keep you protected. Attendees joined KCAV, CrowdStrike, and former CISO of the State of Oklahoma, Matt Singleton, to discuss how CrowdStrike stops breaches and is reducing cyber risk for their customers. Matt has tremendou...
Add Favorite
Getting Started with Decentralized Iden...
Managing identity data for state agencies, localities, and educational institutions is complex. Users must share sensitive personal information and authenticate through multiple identity providers - all of which can access their data, creating an invasive, friction-filled user experience laden with compliance risks. Decentralized identity represents a massive paradigm shift that will protect the privacy of users’ data and let them contro...
Add Favorite
Back to Search Begin New Search