Back to Search Begin New Search Save Search Auto-Notify
Optimize Your Content Supply Chain for...
To deliver personalized customer experiences effectively in today’s digital age, you must be outputting a consistently large pool of content, and to meet this content demand effectively, organizations must have strong processes and procedures established. However, many challenges such as time spent finding assets can hinder an organization’s content velocity. With Adobe solutions, you can streamline operations, cultivate teamwork,...
Add Favorite
Breaking Free of the GTAS Spiral
In this on-demand webinar, Deloitte & Workiva revealed how Deloitte’s Virtual Close Accelerator (VCA) can help expedite your monthly GTAS reporting through automation. The VCA performs over 200 validations and edit checks and produces text files within minutes for Treasury submission. The webinar dove into: The common challenges encountered when submitting GTAS to Treasury. The current capabilities, benefits, and impact of using VCA...
Add Favorite
Empowering Veterans: Mastering Red Hat...
Red Hat is dedicated to supporting the U.S. Department of Veterans Affairs (VA) in leveraging technology for significant transformation. This commitment involves fostering skills and knowledge through a combination of online trainings, in-person led sessions and personalized learning paths on Linux, automation and Kubernetes. VA colleagues joined Red Hat online and reviewed the Training and Certification offerings that are included in the Red...
Add Favorite
Strategic Guidance On Solving M-24-04
M-24-04 requires that federal agencies must have a clear understanding of the devices connected within their information systems to gauge cybersecurity risk to their missions and operations. However, with today’s heavily complex environments this action requires a level of expertise and precision that poses its own set of challenges. To that end, Asc3nd Technologies Group, the premier federal partner in IoT and OT security, invites you t...
Add Favorite
Ensuring Compliance Excellence: Unravel...
Adapting to evolving learning and development needs is a common challenge faced by many organizations, especially when transitioning from traditional in-person training to a modern virtual environment. This shift requires strategic planning and effective implementation to ensure a seamless and successful transformation.A prime example of successful adaptation is Amanda Brueschke's journey at Texas Manufactured Housing. Leveraging Adobe's rich...
Add Favorite
Tableau Enablement Series Part 3: Build...
Attendees of this webinar learned the art of creating inclusive data visualizations. Attendees were able to uncover key principles for designing dashboards that cater to diverse user needs, fostering an environment where everyone can derive valuable insights. During this webinar, attendees learned: Essential principles for designing inclusive dashboards Strategies to enhance usability for diverse user groups How to unlock the full potential of...
Add Favorite
How to Satisfy the New 2024 Email Authe...
Google and Yahoo are shifting long-standing best practices around authentication, encryption, and anti-spam into requirements for emails to be delivered to the inbox. A percentage of messages that do not meet these requirements are already getting temporary errors. In this on-demand webinar, we covered: New Google / Yahoo Requirements PCI 4.0 Compliance and DMARC Business Email Compromise What’s Next? - The future of email security Why E...
Add Favorite
Emerging Trends in Capture: From the Ma...
In this on-demand webinar, attendees explored Federal Agencies Digital Guidelines Initiative (FADGI) and discover compliant solutions that future-proof your agency amidst evolving digital mandates.
Add Favorite
Bridge the Gap Between Productivity and...
Remote access use cases have exploded across the government. Unfortunately, security is often not top of mind as these solutions are deployed, whether because they are urgently implemented or stretched for inappropriate use cases. Yet identities and their privileges are at the heart of almost every cyberattack today and remote access software could easily be misused or co-opted. Watch the on-demand recording to understand how BeyondTrust...
Add Favorite
Real-Time Decision Advantage
In the fast-paced world of modern data-driven operations, the ability to harness real-time insights at the tactical edge is critical. Whether in the fields of defense, emergency response, or critical operations, minimizing latency in order to ensure immediate access to data are not just important; they are essential for effective and efficient decision-making. During this webinar, attendees were able to: Discover the significance of real-time...
Add Favorite
Back to Search Begin New Search