Back to Search Begin New Search Save Search Auto-Notify
Connecting the Unexpected: Scalable Dat...
Thank you for your interest in our Certus Group webinar! During this webinar, attendees learned: How Knowledge Graphs provide a scalable solution for your data structure needs The application of large language models to knowledge graph solutions The diverse use cases supported by Certus Core’s Semantic Knowledge Graph solution The importance of data governance and data standardization in scalability
Add Favorite
Reduce Risk, Enhance Response: Ransomwa...
Every year, ransomware continues to be a persistent and evolving threat in the realm of cybersecurity. As technology advances, ransomware adapts, making it essential for state and local government to stay vigilant and implement robust security measures. The impacts of ransomware extend beyond financial losses, encompassing data breaches, reputational damage, and operational disruptions. Defending your agency against these threats requires proa...
Add Favorite
The Intent to Compromise: Bypassing Fir...
Today’s technology professional needs a detection system that not only blocks any indicator if their site is compromised, but also one that blocks access to malware downloads, and prevents phishing attacks. What if your system could also identify threats while in the planning stage? This is the zone where lookalike detection comes in, and it can proactively prevent attacks before they are even launched. This webinar taught how threat hun...
Add Favorite
AWS Georgia Public Sector Innovation Day
AWS experts are returning to Atlanta! AWS subject matter experts will discuss AWS solutions and how they can help you unleash the powers of digital transformation without disruption by harnessing the proper tools to help your agency thrive. Topics will include organizational intelligence, generative AI, modernization, security, and more.
Add Favorite
Enhancing Unemployment Insurance Integr...
This webinar covered key aspects of Mastercard's approach to fraud prevention, including: Enhancing the accuracy of identity verification processes. Ensuring seamless access to unemployment benefits for legitimate workers. Utilizing existing data to assess the riskiness of claims more effectively. Streamlining the process to fund legitimate claims quickly. Achieving the ideal balance between security measures and accessibility for users.
Add Favorite
Dynatrace Cloud Innovation Day for Fede...
As the AWS technology stack continues to evolve to keep pace with cloud-native enterprises, the role of unified observability to provide actionable insights from data and ensure future-proof growth becomes increasingly imperative. Attendees joined Dynatrace, a leading observability platform provider and an AWS partner, at our Cloud Innovation Day to learn how AI-powered awareness of mission systems is supporting ongoing optimization, efficien...
Add Favorite
Introduction to Tableau Prep
Have you always wanted data prep to be easier or wondered how to keep your data fresh in Tableau? Whether a newbie, an expert or just curious about learning more about Tableau Prep, this webinar is for you! Clean up dirty data and get to analysis faster. Attendees of this webinar learned how to: Redefine the data prep experience: Direct, visual experience gives a deeper understanding of data See the impact of every data change: When you make a...
Add Favorite
Navigating the Data Maze: Unleashing th...
Palantir and Carahsoft hosted an exclusive webinar, Navigating the Data Maze: Unleashing the Power of Palantir AIP. Participants discovered how government tech leaders could make informed decisions across diverse data sources, from clouds to classified networks and tactical edge systems.
Add Favorite
Unlock the Power of Splunk ES and RBA i...
During this webinar, we demonstrated how you can overcome common challenges that customers struggle with when operationalizing Splunk Enterprise Security and Risk Based Alerting. Whether you are a new ES customer, or you’ve had ES for years, this webinar showed you how to quickly unlock the powerful features contained in Splunk ES. We presented a demo of Outpost Security's Splunk App - Zero-to-One. This is a premium Splunk App available...
Add Favorite
Cyber-Informed Engineering for OT Secur...
Attendees joined us for a webinar focused around IT/OT integration for AVEVA PI users. Cyber-Informed Engineering (CIE) is emerging as the most useful change in perspective in Operational Technology (OT) security in a decade. CIE represents a shift in OT security, offering a dual-sided approach. On one side, it educates engineers about cyber threats and mitigation strategies. On the other, it leverages powerful safety, protection and network e...
Add Favorite
Back to Search Begin New Search