26 webcasts found
+ 28 past events found
Back to Search Begin New Search Save Search Auto-Notify
Webinar: Putting Public Safety First –...
This webinar will provide an orientation to Oroville Dam and the State Water Control Project, the February 2017 incident and present the immediate recovery response. Five Learning Objectives of This Course: Introduction to Oroville Dam and the California State Water Project Summary of the February 2017 spillway incident Immediate recovery response Main Spillway recovery response Emergency Spillway recovery response
Add Favorite
Webinar: Concrete Repair and Maintenanc...
This course will provide an overview of the best methods and materials for concrete repair and maintenance. It will include a description of a systematic process to follow to achieve best results and will include information from recent industry wide research efforts to ensure long lasting durable repairs. Five Learning Objectives of This Course: Conducting a thorough condition assessment Most common types of concrete damage Selecting the corr...
Add Favorite
Content Discovery for Law Enforcement A...
In this webinar we will show state of the art capabilities in the areas of automatic face, text, object, and scene recognition, all in an integrated package. This combination of features streamlines the process of content discovery. These tools help analysts and investigators dig deeper and wider, while at the same time achieving much higher levels of productivity. Collecting and analyzing images and videos is the lifeblood of many law enforce...
Add Favorite
Webinar: The State of the Practice of D...
This course will survey dam breach analysis methods currently in use. Difference in methodology, analysis steps, assumptions and results will be described. Specifically, the course will cover hydrologic routing, 1D hydraulic routing, and 2D hydraulic routing. Features of popular software will be summarized, and future advances will be highlighted. What are the five takeaways/learning objectives attendees will receive from this course: What met...
Add Favorite
Navigating the BootHole Mitigation Process
Eclypsium researchers recently disclosed an arbitrary code execution vulnerability in the GRUB2 bootloader that can bypass Unified Extensible Firmware Interface (UEFI) and OS Secure Boot, impacting other OS defenses. In this webinar, John Loucaides, VP of Research & Development at Eclypsium, will help government agencies understand how to navigate the complex process of mitigating the GRUB2 BootHole vulnerability - without inadvertently ma...
Add Favorite
Leverage Advanced Management and Securi...
With Adobe Document Cloud (DC), agencies across the nation are turning manual document processes into efficient digital ones. Adobe Acrobat DC and Adobe Sign empower agencies large and small to work with confidence, knowing that all PDFs and e-signature workflows are safe and sound through management features and security protocols -- all customizable to your organization's needs.Join our complimentary webinar to discover how your team can tak...
Add Favorite
Adobe Experience Makers DHS Workshop Series
Government agencies are rebuilding their digital experiences with citizens and employees in mind. Through innovative and reliable programs, Adobe has been assisting in these efforts by offering solutions that increase efficiency and deliver memorable experiences to citizens, all while protecting confidential data and information within the public sector.Join us for just one or all three of these on-demand webinars in this Department of Homelan...
Add Favorite
Cloud Security Alliance| CCSK Foundation v4.1
The Certificate of Cloud Security Knowledge OnDemand Training program promotes the use of best practices for providing security assurance within Cloud Computing. Intrinsec’s OnDemand CCSK Foundation resources will help you successfully prepare for the Certificate of Cloud Security Knowledge (CCSK) exam. Official CCSK Foundation Student Handbook Over 10 Hours of CCSK Video Content Accessible via your provided student account, you can conv...
Add Favorite
Build a Scalable and Secure CI/CD Pipel...
Join our experts to learn how teams inside Department of Homeland Security (and DHS components) can deploy Splunk, GitLab, and D2iQ together to support CI and CD process automation, securely accelerate application development and deployment, and lay the groundwork for continued modernization and innovation.During this webinar, attendees will learn:How to secure each stage of the development lifecycle through GitLab (SAST, DAST, Container Scann...
Add Favorite
Transforming For The Age of Digital Inv...
Every day around the world, digital data is impacting investigations. Making it intelligent and actionable is what Cellebrite's Intelligence Investigative Platform does best. With an ever-growing variety of digital devices and cloud sources producing volumes of highly valuable data, investigators need intuitive solutions and training to leverage this critical source of evidence when resources are limited. Join us on Thursday, July 29th for a l...
Add Favorite
Back to Search Begin New Search