Back to Search Begin New Search Save Search Auto-Notify
2024 Tech Marketing Benchmarks: Investm...
Technology sector marketing budgets largely remained stable or even slightly increased up to two percentage points despite budgetary pressures. The 2024 Gartner Tech Marketing Benchmarks Survey provides a detailed analysis of marketing investments, brand strategy and activation, brand awareness and demand generation, account-based marketing (ABM), and the impact of artificial intelligence (AI) and machine learning (ML) on tech marketing organi...
June 20, 2024
Organizer: Gartner
Location: Webcast
Add Favorite
Automation as a Cybersecurity Resource
Government agencies at all levels face cyber threats at an increasing rate. Ransomware attacks alone increased by 70% year over year in 2023. Yet agencies are constrained by budget limitations and the shortage of cybersecurity professionals, leading to trying to manage from crisis to crisis and never catching up. Automating security workflows can help agencies get a handle on their challenges and prioritize their security needs, but it isn...
June 20, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
How CIOs Can Win Stakeholder Support fo...
CIOs are responsible for developing IT strategies that facilitate and drive enterprise transformation, and ensuring that those strategies are effectively implemented. Effectively communicating the IT strategy to stakeholders is critical to securing the right support, funding and other resources needed to deliver on the plan. CIOs who struggle to personalize their strategic plan communications to their audience may face a lack of support, hinde...
June 21, 2024
Organizer: Gartner
Location: Webcast
Add Favorite
Google Workspace California Webinar Series
In this webinar series, we will cover the following topics and more: Google Workspace for Government How Google Does Security GenAI - Realistic ways to make it work for you
June 25, 2024
Organizer: Google Government Team at Carahsoft
Location: Webcast
Add Favorite
2024 State of Security Automation Survey
Automation plays a vital role in improving capacity, efficiency, and performance in the SOC. Security teams spend far too much time “in the weeds,” unable to focus on solving the problems that matter. Security orchestration, automation, and response (SOAR) tools have the potential to streamline analysis, reduce response times, and improve quality. However, SOC teams often struggle to realize the full potential of this kind of autom...
June 25, 2024
Organizer: SANS Institute
Location: Webcast
Add Favorite
Develop Key Government IT Metrics That...
Government CIOs and IT leaders often struggle with how to develop, select and use the right metrics, KPIs and dashboards to present to executive leadership. A successful IT performance measurement program communicates metrics that are important to a target audience. This remains true when communicating IT investments to the business. Join this complimentary Gartner IT webinar as a Gartner expert analyzes benchmarks and metrics to provide an in...
June 25, 2024
Organizer: Gartner
Location: Webcast
Add Favorite
Responsible and Transparent Approach to...
The White House Executive Order for New Standards for AI Safety and Security and the Department of Homeland Security’s IT Strategic Plan includes the actions to ensure AI systems are safe, secure, and trustworthy, used responsibly, and address algorithmic discrimination. In this webinar, speakers will delve into the development and training of biometric matching algorithms and steps you can take to mitigate bias. The impact of bias inclu...
June 26, 2024
Organizer: IDGA
Location: Webcast
Add Favorite
Consolidation. Automation. Security. Ju...
Healthcare IT teams of all sizes and experience levels are tasked with enabling medical staff to provide the best possible patient care. However, efficiently supporting a wide variety of medical devices, often shared and mobile, spread across sprawling medical campuses is not easy. It's even more daunting when you consider the increase threat of cyberattacks seeking to steal lucrative patient health information (PHI) or mount a successful...
June 26, 2024
Organizer: NinjaOne Government Team at Carahsoft
Location: Webcast
Add Favorite
Protecting APIs and Sensitive Data
In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems. However, with this increased connectivity comes heightened security risks, particularly concerning the protection of sensitive data in those APIs. One of the most notorious examples of API risk is the Cambridge Analytica scandal in the...
June 26, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Secure Your Multi-Cloud Environment fro...
Security teams today are dealing with endless lists of security issues, but lacking the necessary tools to effectively detect and mitigate the highest risks in their multi-cloud environment. In this session, we will unveil the latest security posture innovations in Microsoft Defender for Cloud, that empower security teams to identify security vulnerabilities spanning from code to cloud, to effectively prioritize the most business-critical risk...
June 26, 2024
Organizer: SANS Institute
Location: Webcast
Add Favorite
Back to Search Begin New Search