1,888 past events found
Back to Search Begin New Search Save Search Auto-Notify
Smarter Tenant Screening: How Leveragin...
Equifax has been hard at work to deliver more comprehensive background verification services to meet the needs of government housing authorities and housing assistance programs. Starting in November, when you order The Work Number™, the gold standard in income and employment verifications, you also have the ability to order a separate, new criminal data verifications solution: Smart Screen™ Advanced - TenantCheck Government. Join u...
Add Favorite
Splunk SAAS for Higher Education
Learn more about Splunk Cloud in higher education. This webinar will cover the value to the business and bottom line, best practices in moving Splunk to the cloud, increase efficiency and ROI by freeing your team of administrative responsibilities, and you will hear from a cloud customer. Join us for an informative webinar, where attendees will learn: To explore the ROI & business value of Splunk SAAS in higher education Best practices for...
Add Favorite
Operating with Continuous Compliance
Why is it important to move from reactive compliance to always compliant? Traditional approaches to ensuring standards compliance, including federal regulations like FIPS 140-2, FISMA and FedRAMP, involve slow, manual post-build security scanning as part of the authority-to-operate process. With different gates of approval, these processes catch compliance and security defects too late, creating rework and sacrificing operational agility. Prog...
Add Favorite
Cultivating Soft Skills for Effective G...
Join us for our SAP and Bryq Cultivating Soft Skills for Effective Government Hiring and Talent Efficiency webinar! Soft skills are now essential for successful government operations and talent management in today's governance setting; technical knowledge is just one of the difficulties. Join Bryq and SAP for this webinar to learn about the importance of these skills in government recruiting and human capital management. During this webina...
Add Favorite
Democracy Goes Digital: The One Thing T...
During this webinar, attendees will learn: How to detect both internal and external actors in voting systems Novel approaches to threat detection and response that can be deployed easily The detailed threat intelligence you will receive in real time about actors threatening election systems
Add Favorite
Successfully Navigate the Convergence o...
In this webinar, attendees will learn: How to overcome internal control siloes and the increasing Importance of Cross-Application GRC Overcoming challenges posed by elevated or privileged access requirements Why Continuous Controls Monitoring should be at the heart of your GRC strategy Best practices for evaluation solutions
Add Favorite
MAXimize Your Creative and Document Workflows
At this year's Adobe MAX Creativity Conference, guests got the inside scoop into the future of Adobe Creative Cloud. Attendees witnessed captivating demonstrations on new updates to your favorite applications, as well as brand new rollouts such as Adobe Firefly Artificial Intelligence (AI). Adobe has launched innovations across Creative Cloud applications, with Document Cloud integrations that will accelerate content creation at the speed of g...
Add Favorite
MOSAICS and the Future of Industrial Cy...
As the vulnerability of industrial control systems (ICS) to cyberattacks continues to have a clear impact on infrastructure security, emerging security solutions are essential to the future of industrial cybersecurity. MOSAICS – More Operational Situational Awareness for Industrial Control Systems – is the working prototype demonstrating an integrated capability for ICS operational defense. This roundtable discussion pulls together...
Add Favorite
BeyondTrust Tech Talk: Gain a 360-Degre...
With the increase in sophisticated cyberattacks, it is imperative to revamp cybersecurity processes and re-focus security beyond the perimeter. In their Special Publication, 800-207 Zero Trust Architecture, NIST points to identity as the critical first step to regaining control over the perimeter. Join this interactive session and demo to understand how BeyondTrust Privileged Account and Session Management (PASM) can help you control access an...
Add Favorite
Pain-free, Controlled Technology Migrat...
Migrating cloud services, databases, and APIs can mean using an all-or-nothing approach that is risky, costly and time-consuming, putting your agency at risk of infrastructure routing complexities and user experience challenges that can slow down or even halt agency modernization efforts. Join LaunchDarkly online on November 14 to discover better, safer ways to migrate your agency’s tech stack and turbocharge your agency’s moderniz...
Add Favorite
Back to Search Begin New Search