Back to Search Begin New Search Save Search Auto-Notify
Embracing A Data-Driven Approach To Cyb...
Understanding what devices exist in your environment is the foundation to security. Identify compliance gaps and risks for all IP connected assets regardless of if they are managed or unmanaged. Where are you today with your Asset Management mission? Allow Armis to provide you real-time visibility and control over every asset connected to your network. The overview of the platform focused on: Discovering and managing an accurate, unified and...
Add Favorite
Google Public Sector Sustainability Vir...
There is an increasing focus among public sector organizations to better utilize data to understand climate risks, increase resilience, and inform land management and planning decisions. Google is proud to partner with GCP native ISVs to drive innovation in the Public Sector’s approach to sustainability and climate change. During this session, Google and Google Cloud Ready Sustainability ISV sponsors, Atlas AI, CARTO and NGIS explored IT...
Add Favorite
Accelerate Flood Planning & Mitigation...
In 2022 there were over 18 weather or climate disasters that exceeded $1B in overall damages/costs in the US. With extreme weather events occurring more frequently each year, the ability to forecast and analyze the impact is necessary in order to enable faster decision-making for risk mitigation and response. During rapidly changing weather events, AI helps organizations manage situational awareness by analyzing large data sets, offering unpr...
Add Favorite
Deciphering CMMC 2.0 Timelines & Milestones
During this webinar, we covered the latest CMMC 2.0 timelines, delivered expert insights, and showcased advanced techniques that will empower organizations to achieve CMMC 2.0 while improving their business operations. We helped prepare businesses for a future of security, success, and unparalleled opportunities in defense contracting! In this webinar, we covered: The CMMC 2.0 Overview Navigating the Timeline Risk Management The Proactive Appr...
Add Favorite
Domino Data Lab Responsible AI Informat...
Everyone needs Responsible AI (RAI) but confusion abounds about what it is, what it delivers and how to achieve it. Done effectively, RAI boosts AI impact by increasing adoption, quality, safety and reliability, while minimizing risks to organizational performance, reputation, litigation and regulatory penalties. In this session with ex-Forrester analyst Dr. Kjell Carlsson, Domino Data Lab discussed practical definitions of RAI, examples of be...
Add Favorite
Third Party Risk Management Handled Webinar
During this webinar, we discussed: What all the AI chatter really means - what's possible, what's not, and who should care Whether AI poses an existential cybersecurity threat and how to protect against it How to use today's AI effectively and responsibly - and how to plan for what's next Register to view this on-demand recording.
Add Favorite
Election Staffing Governance: Securing...
Provisioning identity security for seasonal election workers presents a myriad of challenges for government election boards and commissions. Managing identities across disparate systems and platforms becomes particularly complex due to the temporary nature of election work. Seasonal election workers, including poll clerks and ballot counters, require access to various electoral databases, polling stations, and voting equipment. Coordinating th...
Add Favorite
Practical Applications for Social Benef...
In today's rapidly evolving landscape of social welfare and services, the power of data and artificial intelligence (AI) presents an opportunity to revolutionize how we serve our communities. By understanding basic data and AI concepts, your agencies can unlock new capabilities to streamline processes and improve outcomes for the communities you serve. Exploring AI use cases specific to social benefits programs will allow you to identify and a...
Add Favorite
Seal the Cracks: Strategic Supply Chain...
In this webinar Archer and Carahsoft addressed the escalating challenges posed by supply chain cybersecurity risks in government networks. This webinar dove into: Understanding common supply chain and third-party risks. Proactively addressing and mitigating supply chain attacks to bolster organizational defenses. Leveraging NIST 800-171 best practices to fortify software supply chains against vulnerabilities. Exploring NIST NCCoE supply chain...
Add Favorite
Ensuring Reliability: A Guide to Testin...
We understand that critical errors and broken dashboards can occur at any time, posing significant risks to your business operations, especially during migration or upgrade processes. Our expert-led session provided attendees with practical strategies and techniques to mitigate these risks effectively. This webinar dove into into the crucial aspects of testing, certifying and building trust in your Tableau dashboards. During this webinar, atte...
Add Favorite
Back to Search Begin New Search