Back to Search Begin New Search Save Search Auto-Notify
DORA, SPACE and DevEx: Boost Software E...
Software engineering leaders often struggle to evaluate how the metrics frameworks of DORA, SPACE and DevEx will help them demonstrate software engineering performance. The right set of metrics frameworks can help software engineering leaders make data-driven decisions, but only if they align engineering performance with business value. Metrics focused on software engineering processes and activities alone do not provide insights into the deli...
June 18, 2024
Organizer: Gartner
Location: Webcast
Add Favorite
How to Hunt for Volt Typhoon Malware in...
The federal government has strenuously and repeatedly stated that critical infrastructure providers must be proactive in hunting for malware that may be present in networks, focusing specifically on CCP-sponsored Volt Typhoon Adversary. Join critical infrastructure experts for a panel discussion on how to hunt for Volt Typhoon. Discussion topics will include: How Four18 Intelligence uses UnknownCyber ThreatHunter to hunt for Volt Typhoon and...
June 20, 2024
Organizer: UnknownCyber Government Team at Carahsoft
Location: Webcast
Add Favorite
Explore Your Entire IT Landscape With I...
Join us to see how you can take charge of your IT infrastructure and digital services with ServiceNow ITOM Visibility. This session dives into how ITOM Visibility not only automatically discovers all of your IT resources, but also maps them to create a single, unified view of your entire IT landscape along with an up-to-date, and consistent record in your ServiceNow CMDB. This powerful combination helps you reduce costs and complexity, while a...
June 24, 2024
Organizer: ServiceNow
Location: Webcast
Add Favorite
Securing Supply Chains: How Data and Te...
In an increasingly connected world, disruptions to supply chains can severely impact the Department of Defense’s ability to sustain readiness and execute missions. Consequently, it's critical to analyze, predict, and mitigate potential supply chain risks through innovation in technology and data. By layering publicly available information sources, analysts and government officials can more effectively uncover hidden risk in defense indus...
June 25, 2024
Organizer: GovExec
Location: Webcast
Add Favorite
Securing the Municipal Water Supply fro...
Foreign nation state-sponsored cyber group and threat actors affiliated with the Iranian Government have carried out malicious cyber-attacks against multiple critical infrastructure entities; this and other nation state “bad actors” have their eyes on this precious resource. In one case, hackers targeted and disabled a common operational technology (OT) used at water facilities. Unfortunately, these facilities often lack the resour...
June 27, 2024
Organizer: Semperis Government Team at Carahsoft
Location: Webcast
Add Favorite
Digital Transformation: Are We Truly Re...
Digital transformation has become a north star for organizations looking to become more efficient and intelligent. It aims to shift organizations from siloed systems to streamlined enterprise solutions, promoting data democratization and automation. This evolution was expected to enhance efficiency, accessibility and support. But have we achieved these goals? A key digital transformation success factor is a comprehensive data management system...
June 27, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
Revolutionizing Cloud Data Security wit...
As data volumes continue to soar and regulations become increasingly stringent, organizations grapple with the challenge of comprehending their sensitive data, controlling access to it and pinpointing potential vulnerabilities. To regain visibility and control, forward-thinking organizations are turning to data security posture management coupled with data detection and response. In this session, you'll learn:The security and compliance risks...
June 27, 2024
Organizer: Palo Alto Networks
Location: Webcast
Add Favorite
Considerations for Strategic, Accelerat...
Join us June 27 for an insightful webinar tailored for technical leaders. Our experts will unravel the foundational steps and key decisions that are crucial for launching successful AI ventures. In this session, we’ll explore how a well-designed data storage platform optimized for AI serves as the backbone for AI-powered innovation and operations. What you’ll learn:Efficient end-to-end AI workflows with industry examples and use ca...
June 27, 2024
Organizer: Pure Storage
Location: Webcast
Add Favorite
How to Create an Optimal Data & Analyti...
The potential of data and analytics (D&A) to transform businesses is increasingly recognized across industries. To position their teams as a business discipline that can fulfill cross-functional use cases, data and analytics leaders must optimize their organizational model. However, as organizations scale and expand their D&A initiatives, they often encounter significant challenges, such as skills and staff shortages—the third ma...
July 2, 2024
Organizer: Gartner
Location: Webcast
Add Favorite
Efficiently Protect, Monitor, and Contr...
Privileged passwords and credentials are the gateways to an organization's most valuable assets. They unlock access to privileged accounts used to manage critical devices, applications, DevOps infrastructure, and other assets across the enterprise. They pose significant risks if not protected, managed, and monitored properly. Today, many government organizations still rely on spreadsheets, manual processes, or a combination of solutions to man...
July 16, 2024
Organizer: BeyondTrust Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search