Back to Search Begin New Search Save Search Auto-Notify
Reduce Crime and Mitigate Risks Through...
Today's law enforcement communication technology spans a variety of devices, platforms, and techniques ranging from PCs, laptops, tablets, and a combination of personal and department-issued mobile devices. Voice, text, email, video, and file sharing transmitted internally and externally over these devices are subject to interception, data breach, or exposure long after the useful life of the message. This increases risk for your department a...
July 11, 2018
Organizer: Wickr Gov Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Innovate in Your State: How TWC and Tar...
With a population of nearly 30 million, Texas is larger than most countries, and with the second largest growth rate in the US, it's expanding by leaps and bounds. To keep up with the demands of its large, growing population, cities, counties, and state agencies across Texas are under pressure to deliver services faster and easier while reducing costs. This has spurred Texas Workforce Commission (TWC) and Tarrant County to invest in trusted cl...
June 26, 2018
Organizer: DocuSign Gov Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Emergency Communications Planning 101:...
In a crisis, effective government communication is more important than ever. From natural disasters to data breaches, government is often the primary source of information the public relies on for critical safety and security details. Join this complimentary webinar to rethink traditional crisis communication strategies and learn: The importance of proper preparation of an emergency communications plan for your agencyCommunication tips from e...
May 17, 2018
Organizer: Granicus Gov Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Election Cybersecurity Preparedness
Today's threats can come from anywhere and anyone. New business processes driven by digital transformation increase the attack surfaces, websites, and applications related to the U.S. midterm elections could be an upcoming target for cyber attacks. Threats are constantly evolving in size, frequency, and type, and it is no longer safe to think of attacks being inside or outside. Join us to discuss the following topics:The importance of protecti...
April 19, 2018
Organizer: Akamai Gov Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
The Importance of Having Continuous Fie...
Law enforcement agencies typically capture field interview information on hand-written notecards, which are cumbersome to fill out, submit, store and retrieve. In today's fast-moving and complex operational environment, the prevalence of criminal elements leveraging new technologies and the speed of digital communications has increased the need for a more efficient way to capture field intelligence.Join our subject-matter experts as we explore...
February 28, 2018
Organizer: Haystax Gov Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Storm Water Permitting Compliance for M...
Know how to use your stormwater permit to direct a comprehensive stormwater management. Think back fifteen years ago. Storm water management at municipalities, factories, and warehouses focused on keeping water off the streets and occasionally repairing a failing catch basin. Storm water issues were typically "out of sight, out of mind;" unless a drenching rain event drew attention to a clogged pipe or eroding channel. Now, as we begin 2018, m...
January 16, 2018
Organizer: Lorman Education Services
Location: Webcast
Add Favorite
Open Source Intelligence (OSINT) and So...
Get a live demonstration of Social Navigator, used by government and corporations around the world to monitor social meda and open source channels for threats against people and assets. Used for threat detection, situational awareness, fraud protection, data leaks, corporate governance and executive protection. Social Navigator combs billions of posts across all major social media channels, boards, blogs, paste sites, chat rooms, deep and dark...
December 14, 2017
Organizer: Hypersight Technology Group
Location: Webcast
Add Favorite
The Five Pillars of Effective Physical...
Physical Security includes five components; detection, assessment, command and control (policy & procedures), response and engagement. Sadly, most of us in the security vertical focus on only one or two of these components and miss the others. These five elements must be intertwined and seamlessly integrated. If they all aren’t addressed, the “bad guy” wins. In this session we’ll outline what each component is, how...
December 12, 2017
Organizer: Haines Security Solutions
Location: Webcast
Add Favorite
Overcoming Today’s Social Inequities wi...
Could technology make a difference in speeding up how we respond to social inequities? The answer is yes. Governments around the nation are faced with issues like homelessness, blight, opioid addiction, access to care, veterans’ services, access to transit, and many more. New technology innovations, like GIS, big data and analytics, can bridge the gap between resources and the less fortunate, shorten the cycle to solve inequities and bet...
November 30, 2017
Organizer: GovLoop
Location: Webcast
Add Favorite
After the Disaster: Mitigating Infrastr...
The Association of State Floodplain Managers invites local floodplain administrators, flood development permitting professionals, and other interested practitioners to our upcoming webinar, “After the Disaster: Mitigating Infrastructure Against Flooding Using 406 Mitigation Assistance)" on November 9 at 1:00-2:30pm Central Time. Disaster costs are increasing – as is the amount reimbursed to states through the FEMA Public Assistance...
November 9, 2017
Organizer: ASFPM
Location: Webcast
Add Favorite
Back to Search Begin New Search