Is This Getting More Complicated? Commu...
For your programs to function properly, you need residents and businesses to understand what you do, discover what you need them to do, and do it. Sounds easy enough—but we all know it is one of the most challenging parts of our jobs. You are competing with cute kitten photos and so much more. In this webinar, you’ll learn to understand the competition, the communications challenges embedded in your job, and the necessity of target...
Enhance Collaboration with Customized W...
Digital assets are the foundation of engaging experiences, and timely, accurate, and controlled access to assets is vital for an agile organization. With Adobe Experience Manager (AEM) Assets, enterprises have access to the tools that centralize assets, content, workflows, and operations across teams and individuals. AEM Assets also provides a global shared repository equipped with enterprise-class visioning, search, metadata and taxonomy mana...
E-Signatures And Your Agency
Government agencies are going digital for a multitude of reasons: to streamline services and approval cycles, improve efficiencies, cut costs, reduce paper waste, and meet increasing citizen demands, just to name a few. The use of digital technologies is being mandated at the federal and state level, however, implementing electronic and/or digital signatures raises questions for many government agencies about compliance and the legality of e-s...
Innovating the Core: SAP BusinessObject...
Part 4: How to advance your analytics for the digital age with SAP BusinessObjects Enterprise, premium edition To make better-informed business decisions in the digital economy, you need the ability to quickly analyze and share insight across your entire organization. So how do you do this across all user levels in business environments that span a wide range of data sources and devices and incorporate a huge amount of data? SAP BusinessObject...
September 20, 2016
Organizer:
SAP Location:
Webcast
Operationalize Cyber Intelligence in Re...
View our on-demand webcast to learn how you can perform real-time security analytics and threat hunting enabled by the performance and speed of the leading in-memory data management and analysis platform, SAP HANA, and the leading Threat Intelligence platform, ThreatConnect. We will discuss how you can unite people and processes while simplifying data and technologies in your network environment. By the conclusion of this webcast, you will und...
Surviving a Modern Cyber Attack with Is...
Join us for an exclusive webcast during which we'll share intelligence and lessons learned from these attacks. In addition, you'll discover:Threat and risk - what's different about the latest ransomware and extortionware cases and how IT teams are approaching the problemVisibility and detection - what IT teams can do to protect their environmentsRemediation and recovery - best practices and lessons learned on how to recover from an attackCyber...
Intelligent Threat Detection in Government
Whether created maliciously or unwittingly, insider threats can result in grave damage to national security interests. Traditional methods of detection rely on monitoring structured data, such as system access logs. However, critical insights that can help thwart an attack lay hidden in massive volumes of unstructured data. Unstructured data represents typically 80% of available information and typically remains unobserved and underutilized. C...
August 30, 2016
Organizer:
FEDINSIDER Location:
Webcast
How to Successfully Manage a Government...
Setting Your Project Up for Success Program and Project Managers (PMs) have the primary responsibility for developing and managing projects according to government requirements and measurable performance standards. They ensure that all activities in the project life-cycle achieve their intended outcomes.This webcast will address the government PM’s role and a number of tools that can be used during performance of the project to ensure a...
Trends in Network Modernization and Security
Federal networks are in the midst of a disruptive phase for the first time in more than a decade. Agencies are transforming their infrastructures to take advantage of new technologies in the cloud and on the software layer. Software-defined networking is growing across the government as a means to provide more security with less complex at lower costs, and with greater efficiency. Learning Objectives Discuss the cybersecurity benefits of netwo...
July 14, 2016
Organizer:
FEDINSIDER Location:
Webcast
Splunk for Security Bootcamp
About the Splunk Security Bootcamp – Should be attended by people specifically interested in applying Splunk to the Security domain. Both core Splunk and Splunk for Enterprise Security will be used in the lecture and hands-on lab. This class does not cover Splunk interface basics so it is helpful to have an understanding of Splunk basics before attending. Where: Live Hands-on WebEx Webinar Date: Check the GTRI Events Page for upcoming Bo...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.