Back to Search Begin New Search Save Search Auto-Notify
Next Level Operational Efficiency with...
Securing today's public sector network presents the challenging combination of an expanding attack surface and an exotic array of hard-to-detect threats.This next installment of our Infoblox+Splunk Enterprise Security Series will highlight cases involving the unique interplay between Infoblox's rock-solid core network services foundation and Splunk's industry leading large data correlation engine.Infoblox Senior Security Solutions Advisor, Chr...
Add Favorite
SIEM Modernization Benefits for Higher...
Join Exabeam for an informative discussion on the essential features and capabilities for IT decision makers to look for when evaluating potential candidates. Attendees of this webinar will learn about: Advanced processing and analytics Automated threat detection and prioritization Facilitated incident response and triage Proactive (and reactive) threat hunting
Add Favorite
Agenda & Meeting Software 3.0
Agenda and meeting management software is no longer just a basic shortcut to creating and posting agendas and minutes to your website.Why? Citizens expect a dynamic virtual meeting experience that's engaging, accessible, and simple. Join us for a complimentary webinar to learn how to meet the public's demand for seamless digital experiences and the future of public meeting software.Register today to discover how to:Grow your audience and incre...
Add Favorite
What's New: Adobe Connect 10.5
The much anticipated HTML5 focused release of Adobe Connect 10.5 will be available this summer! This version will complete the participant experience with a more robust HTML client, making Adobe Connect collaboration faster, sleeker, and more accessible than ever. Join our on demand webinar to hear from Peter Ryce and Alistair Lee as they give a deep dive into Connect 10.5 - the platform which goes beyond web conferencing. Attendees will disco...
Add Favorite
The Exponential Strategic Advantage of...
Efforts to keep the nation safe, hinges on our strategic and tactical advantages. Machine learning (ML), a subset of artificial intelligence (AI), provides unparalleled insights into large data sets. These insights are critical to maintaining military superiority and safeguarding our nation's interests.Join us to learn more about the role of open source software in this paradigm and how Red Hat can enable the DoD to leverage machine learning w...
Add Favorite
Assess Your On-Prem Environment, See Yo...
Your path from On-Prem to the Cloud may have more questions than answers. Google Cloud can help you bridge those gaps with assessment and readiness tools that will give you confidence in your migrations to the Cloud. Join this webinar to learn how other agencies are adopting the Cloud and learn a simple phased approach to start your own journey to the Cloud. Hear from a Google Engineer about how Google Cloud can do a mutual assessment of your...
Add Favorite
Five Ways Government Can Streamline Pro...
Citizens and staff members expect more from government digital services now more than ever before. At the same time, agencies are having to accomplish more with less in a flat budget environment. Digital forms and electronic signatures can help government do more with less while meeting rising expectations from the public staff. Register now to secure your spot! Join DocuSign to learn how the most successful government agencies are streamlinin...
Add Favorite
Email Strategy: How to Find Flaws, Fix...
Your communications strategy plays a critical role in your agency's or department's ability to accomplish its mission. Email is the most cost-effective, measurable, and adaptable channel for doing so. But could your email strategy be even better? What metrics should you be considering for success? And what could you be doing right now to improve your impact? Join us while we walk through a proven path to email success. You'll learn: Warning s...
Add Favorite
Ransomware: The Cyber Warfare Attack To...
Ransomware attacks are on the rise, with at least 22 reported breaches of public sector networks in 2019 alone. Popular targets are cities, police stations, and schools, and the attacks can tally up millions of dollars in recovery costs. This situation is likely much worse, as many ransomware attacks are unreported. Public sector organizations are typically understaffed and underfunded, making them ripe targets for malicious actors intent on c...
Add Favorite
Safeguarding Elections: Protecting Citi...
The Mueller report, following the 2016 election, identified malicious adversaries that undermined trust in the democratic process. With the complex and multifaceted threats we are facing with the upcoming 2020 elections, there is an urgent need to protect our electoral infrastructure.Election interference also poses a threat to citizens' personal information. Personal Identifiable Information, PII, such as social security numbers, are accessib...
Add Favorite
Back to Search Begin New Search