Back to Search Begin New Search Save Search Auto-Notify
Introduction to Analytics with Alteryx
View our on-demand session on conducting end-to-end analysis. To start off, we unpack how Federal, State, and Local agencies are utilizing data-driven approaches to enhance their operations, including reconciliation, risk assessment, and data deduplication. View this on-demand webinar on how to apply these techniques for yourself. You will learn how to bring in and merge different sources of data, ensure data quality by conducting exploratory...
Add Favorite
Corporate Web-Based Export, Import, and...
Corporate Web-based Export, Import, and Sanctions Training on your LMS or Ours Choose the content that you need from CE’s expansive library, personalize it for your organization, configure to fit the varying training needs of your learners, and deploy throughout your global organization with state-of-the-art tracking and assessment tools. Over 120 training modules in the categories of: EXPORT COMPLIANCE IMPORT & CUSTOMS SANCTIONS COM...
Add Favorite
Content Enablers Export, Import, and Sa...
Current regulatory content and practical training scenarios in the areas of export, import, sanctions, and security pair with flexible course delivery options to offer solutions that fit the full spectrum of training needs. DOWNLOAD CATALOG HERE
Add Favorite
Speed Changes Everything
Are you looking for a quick and secure method for your innovations? Tricentis and SAP invitied you to learn how speed can change everything! You learned how to deliver the fastest, safest, and lowest-cost methods for SAP release. In this On-Demand webinar, you observed: How SAP customers are putting their initiatives into overdrive by cutting the time, risk, and cost associated with deploying SAP projects. How SAP’s official testing solu...
Add Favorite
Fireside Chat: Federal Cybersecurity Di...
Orca Security and Carahsoft invited individuals and their teams to join them for a virtual, interactive fireside chat with Coalfire to discuss alignment to Federal cybersecurity directives which impact every public sector organization. This webinar was joined by Doug Hudson, VP of Public Sector at Orca Security, and Nate Demuth, VP of Cloud Services at Coalfire, during a moderated session with Neil Carpenter, Principal Technical Evangelist at...
Add Favorite
Risk and Reels: A Cybersecurity Podcast...
Hackers, curiosity, security, pen-testers, kindness, analogies and Hollywood criminals. Welcome to the first episode of Risk and Reels with Jeffrey Wheatman, featuring Jayson Street (OG Pen Tester and Chief Chaos Officer for Trusec), a self-proclaimed hacker. WHAT IS RISK AND REELS: A CYBERSECURITY PODCAST? A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheat...
Add Favorite
Seamlessly Adopt the Cloud with VMC on AWS
During this webcast attendees learned about how VMware Cloud on AWS solves migration and modernization challenges by delivering a hybrid cloud service that integrates VMware’s flagship software-defined data center along with VMware vCenter management as well as robust disaster protection, and optimizes it to run on dedicated, elastic, Amazon EC2 bare-metal infrastructure.
Add Favorite
Risk, Issue, and Opportunity Management...
How can ServiceNow help end-users comply with the DoD’s Released Management Guide, “DoD Department of Defense Risk, Issue, and Opportunity Management Guide for Defense Acquisition Programs”? During this session, we discussed how customers can both mitigate risk in portfolio management, as well as adhere to the requirements of the Management Guide - all in real-time (as opposed to accessing risk during a project postmortem ass...
Add Favorite
Why Traditional EDR is Still Not Enough...
Attendees of this webinar heard how VMware Carbon Black XDR is the new baseline for serving up the security for organizations today for operational excellence and reducing cost liabilities. With XDR, organizations have been able to experience a number of proven benefits when measured against traditional endpoint security methods, including: Unique capabilities for identifying, prioritizing, and reducing risk Complete coverage: endpoints, work...
Add Favorite
Introduction to Feature Flag Management...
Deploying new applications and software updates is a risky operation for federal agencies that can leave developers scrambling to resolve issues. Feature flag management addresses many of the issues federal agencies face in the development cycle. It can enable greater developer productivity, speed up the development cycle and reduce the risk associated with deployments using continuous integration and continuous deployment (CI/CD) practices....
Add Favorite
Back to Search Begin New Search