Back to Search Begin New Search Save Search Auto-Notify

Upcoming Events

Past Events

Agency + Refine Your Search

Organizer + Refine Your Search

Focus + Refine Your Search

Category + Refine Your Search

Back to search

Introduction to Distributed Denial of S...
A Denial of Service (DoS) attack is when an attacker attempts to prevent legitimate users from accessing information or services. And a Distributed Denial of Service (DDoS) attack is when an attacker takes control of your computer to attack another computer. Register today for this free GovLoop Academy course that includes six lessons to learn more about what DDoS attacks are, what an attack could mean for your agency, how to prepare for an at...
Add Favorite
Comply to Connect Webinar
The idea behind Comply to Connect (C2C) is simple: Implement controlling countermeasures that safeguard your information systems. However, as with any U.S. Government initiative, there are a few details you should know. View our on demand webcast as we clarify the concept and use case of Comply to Connect. During this informative webinar, you’ll also see real-world examples of how ForeScout® CounterACT® can provide visibility, hy...
Add Favorite
All Roads Lead to Empowered Citizens: T...
Attendees of this virtual summit had the opportunity to join several speaking sessions led by our AppExchange partners. This full day, virtual event focused on the challenges and opportunities government employees are facing and what solutions are available to them. Check out the on-demand recording of this event!
Add Favorite
How Open Source Can Help Overcome Gover...
Open source has become important for solving complicated issues across the board. But where do agencies begin? How can you take advantage of open source technologies?View this on-demand 1 hour online training to learn how open source software is propelling government forward. Specifically, we'll share: Case studies and examples of research-focused government organizations that are leveraging open source. Benefits of an open source strategy to...
Add Favorite
Ensuring Safe Access for Government Users
Verifying the identity and intentions of someone accessing confidential government information is never easy. Then add multiple mobile devices, ramp up the number of cyberthreats, and exponentially increase the amount of information available online -- now you're really facing a challenge. With these mounting obstacles, how do you keep your information secure? In this 1 hour online training you will learn how to: Secure information without imp...
Add Favorite
Enabling Analytics in the Age of the In...
We are entering the Internet of Things (IoT) Era, where practically everything is connected and capable of generating data. It's time to figure out how you can leverage IoT data in your agency's analytics strategy. Join us on December 11th at 2:00PM ET for an online training to learn how to enable analytics in the IoT era. Our experts will cover: The value of machine data to you, your constituents and your agency. Steps to deriving business va...
Add Favorite
DorobekINSIDER LIVE: Should You Be Dati...
Every day it seems like there's a new online dating site geared towards a very specific audience. A dating site for farmers? Yes, it exists. A matchmaking app for individuals over 50? Yup, it's real. The reason these niche online sites exist? Because data has shown there is an audience for them. The government is trying to get into the data game, too. They're using their vast data sets to make better and more informed decisions. On Wednesday,...
Add Favorite
Driving New Insights Through Next-Gen T...
It's no secret that big data can provide valuable insights. And the government transportation marketplace is the next big area for big data to have a big effect.On Thursday, February 19th from 2:00 PM ET / 11:00 AM PT, join a panel of government and industry experts to discuss: The emerging opportunities from big data analytics for transportation agencies and departments How organizations are using big data insights to carve a sustainable adva...
Add Favorite
How Network Modernization Can Transform...
The nuts and bolts of how your agency’s IT infrastructure operate are failing. Many federal IT networks are struggling to keep up with ever-increasing performance demands. Increased mobile use, expanded telework, video, cyber risks and bandwidth-hungry apps are straining even the most robust agency infrastructures. IT leaders in many agencies are responding by shifting to a software-driven model of delivering advanced network functionali...
Add Favorite
Show Me the Money: Transforming Gov's B...
Managing hundreds of grants and collecting the proper data is not easy, which is why governments need a grant management strategy. In 2013, the city of Detroit filed for bankruptcy, prompting them to revolutionize their approach to funding by targeting grants. In six years, Detroit went from 156 to 411 grants awarded, transforming the funding model of the city. Watch the on-demand webinar to discover how state and local governments can follow...
Add Favorite
Back to Search Begin New Search