Back to Search Begin New Search Save Search Auto-Notify
Streamlining Supervision: Using Mobile...
Probation and Parole officers often face time-sensitive situations requiring quick mobile device examinations. However, managing these devices effectively can be challenging without the right tools and training. Access the on-demand recording to join ADF Solutions as they delve into practical insights and best practices to help you navigate the complexities of mobile device investigations for Probation and Parole. Specifically, you will learn...
Add Favorite
Navigating the AI Frontier: A Dispatch...
AI is on the rise worldwide, and its emergence is opening doors for innovative solutions. However, because AI is still growing and developing, many agencies have yet to truly dive into its potential and what it can unlock. Understanding AI’s practical uses and cloud implementation potential is crucial for any federal agency looking to modernize and increase productivity. In this GovExec TV dispatch from Oracle’s Fed Forum, join us...
Add Favorite
Splunk Workshop Series
Participants joined us for a workshop series designed to enhance Splunk skill sets across their organization! Our five-part virtual workshop series covered fundamental basics, machine learning, observability, dashboard studio, and investigating fraud. Led by industry experts, these hands-on workshops empowered teams to unlock the full potential of Splunk!
Add Favorite
Automate Your Zero Trust Workflow
During this webinar, Zack and Willie discussed: How PC Matic's innovative technology modernizes traditional Software Bill of Materials (SBOM), Zero Trust, CDM, and Secure by Design initiatives How the solution streamlines Zero Trust policy enforcement points, simplifying governance processes while bolstering compliance efforts. How the solution integrates seamlessly into existing infrastructures, optimizing operations without solution disrupti...
Add Favorite
Salesforce Hawaii Innovation Day
On May 16th, attendees of the Salesforce Hawaii Innovation Day in Honolulu explored how cutting-edge technology platforms seamlessly integrate with your existing infrastructure inside the Salesforce platform, empowering automation, collaboration, mobility, and agile adaptation to change. All current and prospective Salesforce users were invited to attend! An overview of the day's sessions: Salesforce Keynote Address Fireside Chat - State of Ha...
Add Favorite
Empowering Government: Harnessing Data...
Watch a complimentary webinar tailored to government agencies and institutions, where SalesIntel dives into the power of data intelligence to drive operational efficiency and effectiveness. Drawing on their expertise in providing comprehensive B2B data solutions for the public sector, explore how government organizations can leverage data to streamline operations, foster meaningful relationships, and pioneer AI technologies. From identifying f...
Add Favorite
CWE for Zero Days - not CVE | Episode 126
The Mitre CWE (Common Weakness Enumeration) database talks about kinds of problems that can show up in the future - future zero days - rather than CVE that talks about what vulnerabilities were discovered in the past. Susan Farrell walks us through the CWE and how both vendors and owners & operators use it.
Add Favorite
AI-Enhanced Inspections & Work Order Au...
This webinar delved into the invaluable lessons learned and the powerful capabilities unlocked through this venture and implementing it for the state government. We will discuss how AI and Salesforce are redefining efficiency in government operations, particularly in the realms of case management and resource allocation. Key Takeaways: Image Recognition: Confirming descriptions and providing additional details. Data Management: Enhancing clean...
Add Favorite
Microsoft Office Offensive Tradecraft
View this webinar to learn more about: Recent developments such as Mark-of-the-Web Microsoft security controls including trust settings and decision flows Tactics for gaining initial access, lateral movement, and long-term persistence
Add Favorite
Enforce Least Privilege Across Every Endpoint
Almost every cyberattack today involves the exploitation of privileges. Broad privileges and entitlements greatly expand the attack surface and leave your organization extremely vulnerable to security breaches. However, a least-privilege access approach requires that users and programs receive the least amount of permission when required to complete specific tasks. Least privilege is one of the most essential security measures for organization...
Add Favorite
Back to Search Begin New Search