95 webcasts found
+ 125 past events found
Back to Search Begin New Search Save Search Auto-Notify
A Three-part series: Managing Digital R...
A three-part series: Managing digital risk and beyond Digital transformation is a critical priority for many companies across most industries, and it’s more than a catchphrase. Digital transformation is truly changing consumer and business experiences. Through a series of webinars, we’d like to create a common understanding of digital risk, how to successfully manage it, and demonstrate how easy it is for everyone to participate in...
Add Favorite
Fiscal Responsibility, Economic Recover...
Digital transformation is on the roadmap of every company. What happens when transformative change is driven by disruption and crisis? This informative session will enable you to become data driven through crisis, and learn how organizations found data analytics support during COVID-19. Hear inspirational stories from government customers who used creative data and analytics solutions during COVID-19 pandemic that were critical to their organi...
Add Favorite
Return to Campus with Splunk and NuHarbor
Universities and health officials around the world are working vigorously to ensure students can safely return to campus. Schools need to know who may have been in contact with a person that has tested positive for COVID-19, as well as where on campus that person has been. Having this information will allow schools to make quicker and more efficient decisions regarding campus safety and student quarantine. Along with manual tracing efforts, a...
Add Favorite
Unit 42 by Palo Alto Networks
Unit 42 brings together world-renowned threat researchers with an elite team of security consultants to create an intelligence-driven, response-ready organization. As threats escalate, Unit 42 is available to advise federal agencies on the latest risks, assess their readiness and help them recover when the worst occurs. Whether responding to a breach or managing cyber risk, Palo Alto Networks understands your challenges. Hailing from US govern...
Add Favorite
Cyber Threats & Lessons Learned from 20...
View this on-demand webinar to review some of the most impactful hacks from 2021 and the key takeaways for protecting critical data and infrastructure as we enter into the new year of 2022. Topics discussed include: A review of some of the most effective hacks of 2021 such as the Colonial Pipeline ransomware incident, SolarWinds supply chain attack, Microsoft Exchange hack, NSO Group Apple iOS hack with Pegasus, and more. Why an understanding...
Add Favorite
FREE/ON-DEMAND: Assessing ITAR Complian...
Assessing ITAR Compliance Programs REGISTER NOW TO VIEW THIS COMPLIMENTARY WEBINAR ON-DEMAND! This webinar takes a deep dive into the State Department's recently published ITAR Compliance Program Guidelines and their prescription for a healthy, risk-based trade compliance program that keeps pace with the daily business developments of an organization. We discuss three key principles common to all trade compliance programs: No two companies are...
Add Favorite
Understanding Incoterms 2010
International Commercial Terms, or Incoterms®, are commercial terms or rules that define the seller's and buyer's responsibilities for the delivery of goods under a sales contract. They are published by the International Chamber of Commerce (ICC). Incoterms® are widely used in commercial transactions but often ignored until they are needed. Usually they are incorrectly used and in some cases taken for granted until a shipment goes wro...
Add Favorite
Supercharge Permitting and Licensing wi...
The permitting office is arguably the most important agency for keeping the local economy humming and keeping budgets in the black. Permit and licensing fees account for 6% of state tax receipts on average and can be much higher in states without income or sales taxes. In this era of a growing economy and flat budgets, streamlining your permitting and licensing process is critical. But how do you get started? The DocuSign Agreement Cloud, with...
Add Favorite
MetaAccess: Next Generation Network Acc...
Agencies are increasingly challenged by the proliferation of risky, unmanaged devices in the age of bring-your-own-device in the workplace. Fortunately, there is a surprisingly simple way to tame all those potentially rogue devices with industry-leading endpoint security and advanced threat prevention technologies. OPSWAT MetaAccess empowers organizations to enforce internal security standards, meet security, and regulate compliance across all...
Add Favorite
Fast-Track Digital Transformation of Ci...
Federal system integrator, The Zoldak Group, has accelerated a critical compliance project for the Office of Congressional Workplace Rights. They reduced costs and hit milestones by building on the foundation of Accellion's platform's proven usability, security, and compliance.The Zoldak Group met tough compliance requirements and kept up with a challenging schedule to produce an application employees like to use. The application allows for qu...
Add Favorite
Back to Search Begin New Search