24 webcasts found
+ 268 past events found
Back to Search Begin New Search Save Search Auto-Notify
ThreatConnect: Threat Intelligence Webinar
During this webinar, attendees learned to understand the complexity of defending an increasingly diverse attack surface against increasingly diverse cyber threats. Also during this exclusive webinar, attendees learned what they should prioritize to make a material impact on their cybersecurity resiliency. During this on-demand webinar, our attendees learned: Details and logistics about DHS' State and Local Cybersecurity Grant Program to bolste...
Add Favorite
Revolutionizing Government Corresponden...
Agencies struggle with a high volume of correspondence from citizens and constituents, often lacking streamlined processes for processes for integrated and timely request handling and relying on Excel spreadsheets and email exchanges among team members introducing operational inefficiencies, lack of visibility, compliance challenges, standardization, and risk of errors. Nuvitek presents a robust AI-driven Citizen Engagement Solution crafted o...
Add Favorite
Accelerating AI Insights Delivery with...
U.S. Department of Justice (DOJ) and U.S. Department of Homeland Security (DHS) agencies are adopting AI/ML to enhance their mission capabilities, though the degree of adoption varies among teams. Common challenges include: Complexities and time needed for iterative cycles to train, test, select and retrain the ML model for optimal prediction accuracy Need for collaboration among cross-functional teams to refine workflows, processes and share...
Add Favorite
Meeting the Quantum Deadline: Migrating...
According to OMB M-23-02, agencies are directed to submit a prioritized inventory of information systems and assets, excluding national security systems, that contain CRQC-vulnerable cryptographic systems to ONCD and the Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA). No later than 30 days after the submission of each annual inventory of cryptographic systems required under Section II of this memorandu...
Add Favorite
Back to Search Begin New Search