Panel Discussion: Zero Trust and the Pe...
The seismic shift to distributed workforces has dissolved the Defense Department’s traditional network perimeter and put a focus on a new critical aspect of cybersecurity: identity management. With users and devices now accessing critical information, systems, and applications from anywhere, the mindset must be to never trust and always verify. In this new environment, a zero trust approach can help agencies minimize their attack surface...
Nebraska's DHHS Data Nexus: Modernizing...
Nebraska’s Department of Health and Human Services (DHHS) team contributes to the lives and health of Nebraskans every day. Their mission, “Helping people live better lives," provides the motivation to make a difference. To ensure the continued success of that mission, Nebraska’s DHHS recognized a need to modernize the data management strategy and the need to deliver the data the organization needs, when they need it, at the...
Faster, Smarter, Stronger: Implementing...
As government organizations modernize and innovate, the old adage stands true – time is money. Artificial intelligence (AI) and machine learning (ML) can help agencies be more efficient and speed time to mission. Throughout this course, we will explore how to leverage AI/ML to automate processes for better insights and efficiencies; gain visibility into networks to detect anomalies and prevent cyber threats; and integrate ML into systems...
Cloud 101: Enabling and Securing Govern...
Mastering the cloud is essential to digitally transform your agency. Throughout this course, we will explore the ins and outs of cloud computing – how to leverage it to advance digital transformation and how to secure your cloud infrastructure for mission critical workloads. We’ll also uncover best practices for migrating to the cloud, how to build an infrastructure that supports both remote and onsite work, and how to acquire clou...
Internet of Military Things: A Deep Div...
The concept of the Internet of Military Things (IoMT) brings clear, actionable data to the forefront, filtering away the noise to get to what really matters. In this course, we will explore the ins and outs of integrating sensors effectively across military base ecosystems. We’ll identify common challenges, draw insights from installations, and learn how to leverage devices at the edge. Do you know how the Department of Defense can integ...
Building a Cloud Security Culture - Mer...
To innovate faster, you need the right tools to unlock the ability to adapt and scale quickly. Most importantly, you need the right security levels to get there. Throughout this course, we’ll talk about the benefits and capabilities of DevOps, as well as how to appropriately integrate security into DevOps to fuel innovation. We’ll complete the course by featuring the baked-in security controls available on AWS and highlight the key...
Meeting the Mission at the Tactical Edg...
The mission doesn’t stop when today’s cloud environment isn’t accessible in the field. So, how do you ensure critical government agencies and industries always have access to the technology and information they need? Throughout this course, we’ll explore how to bring cloud services to the edge and ensure it’s secure, compliant, and effective. With the AWS suite of edge technologies, you have the flexibility and ad...
How to Streamline the Emergency Rental...
The COVID-19 pandemic has impacted just about every aspect of our lives – from how we do our jobs, to how our children learn, to how we greet each other on the street. The rollout of the vaccine feels like a turning point in our road to recovery, but many are still struggling to pay rent and utilities. The government’s Emergency Rental Assistance program makes $25 billion available to states and local governments to assist eligible...
Cybersecurity, Ransomware, and the Clou...
Sharing data in the cloud offers a huge advantage for educators to easily offer faculty and students the ability to work and study wherever they are. It also helps the IT Operations team to simplify management and costs for infrastructure, data storage, and data protection. But you may have questions as you determine your cloud strategy. How secure is the cloud? Is all your data automatically protected in the cloud? What happens when ransomwar...
Adobe Sign Webinar Series: Transform Pa...
In today’s remote world, Adobe supports government agencies in delivering the best possible document signing experiences by replacing physical signatures with electronic signatures (e-signatures). As the public sector advances to 100% paperless processes, in efforts to meet digital transformation initiatives, Adobe Sign is empowering users to deliver fast, legal, and secure services while cutting costs associated with manual, paper-based...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.