Back to Search Begin New Search Save Search Auto-Notify
Actionable Intelligence for Maintenance...
The effectiveness of Maintenance Repair Operations (MRO) directly impacts DoD readiness and lethality. The orchestration of thousands of tasks and moving components around the globe is no small undertaking involving parts inventory, logistics, and installation activities carried out by our warfighters. The high complexity of the MRO function can be managed through implementing digital tools such as artificial intelligence and machine learning...
November 17, 2020
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Ransomware: Zero Trust and the Threat Inside
According to Verizon’s 2020 Data Breach Investigative Report, ransomware now represents 27% of all malware attacks. Over 30% of ransomware starts from within. That means that network defenders must consider the possibility that malicious employees could be the origin of an attack. Cyber criminals are stepping up their game by exploiting fear and uncertainty during the pandemic by launching a steadily increasing amount of cyberattacks. Re...
October 21, 2020
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Digital Healthcare: Safeguarding Patient Data
The COVID-19 pandemic has propelled telehealth into prominence, and telemedicine, once viewed as a convenience, is now an essential tool for treating patients. During the months of April and May of this year, telehealth increased nationally by more than 5,000% over last year. While telehealth is a necessary and beneficial solution during the COVID-19 crisis and beyond, its growing use can jeopardize the safety of sensitive patient data and the...
October 8, 2020
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Path Forward for IT Modernization in Go...
According to Gartner, moving applications to the cloud is a top priority (and one of the most often mentioned game-changing technologies) for government CIOs today. But obstacles – like lack of experience in cloud migration, security concerns, and policy hurdles – continue to impede agencies’ progress. The COVID-19 pandemic has magnified this issue considerably as agencies rely on their information technology infrastructure t...
August 11, 2020
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
How to Win Executive Buy-In for Your CX...
The Office of Management and Budget has established a Cross-Agency Priority Goal charging government to provide a modern, streamlined, and responsive customer experience across public sector organization. Government executives are embracing the concept of customer experience as a means to improve the usability and reliability of critical digital services like patent services, veterans’ benefit delivery, student loans, disaster aid, and t...
July 15, 2020
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
The Telehealth Tsunami: Safeguarding Pa...
The COVID-19 pandemic has propelled telehealth into prominence, and telemedicine, once viewed as a convenience, is now an essential tool for treating patients. Research firm Frost & Sullivan predicts that the use of telehealth will increase by 64.3% nationwide this year. While telehealth is a necessary and beneficial solution during the COVID-19 crisis and beyond, its growing use can jeopardize the safety of sensitive patient data and thei...
June 25, 2020
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Identity and Access Management Successe...
Higher Education faces a unique set of challenges when managing identities, securely connecting users to both SaaS and on-prem applications, and securing campus administrative servers. Complicating matters, colleges and universities service a broad range of personas including staff, faculty, adjunct faculty, admissions applicants, students, alumni, donors, contractors, athletics/arts supporters, and many others who walk across campus every day...
June 11, 2020
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Understanding Cybersecurity Risks
Cybersecurity challenges demand that an organization face two facts. First, the protection of critical company and customer information is a business requirement to protect the company's reputation and enterprise value. Second, even the best programs will experience failure and expose some information the company would like to protect. We at Corporate Compliance Seminars believe confidence in security and privacy does not come from knowing not...
May 26, 2020
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
Defending Your New Perimeter from Next...
It is more important than ever to protect the availability of networks, security and application infrastructures to maintain continuity of operations. As government employees and contractors are continually accessing job essential applications from remote locations, new vectors of attack are emerging. One of the biggest threats to maintaining continuity and continuity of operations is a DDoS attack. Join Tom Bienkowski, Director, Product Marke...
May 14, 2020
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Comms in COVID's Wake: 5 Steps Toward R...
For many public sector communicators, the rush to send mass announcements about COVID-19 health information is being replaced by a need to inform a variety of audiences at scale for everything that’s come after. Whether communicating community risk levels, sharing testing information, or handling any number of unexpected scenarios, your audience will put new demands on your work. How do you do it well — at scale? In this webinar, y...
May 6, 2020
Organizer: Granicus
Location: Webcast
Add Favorite
Back to Search Begin New Search