Back to Search Begin New Search Save Search Auto-Notify
Quantum Readiness: Effective Strategies...
Quantum Computers pose an existential threat to data encryption. In addition, adversaries are already capturing sensitive network traffic for Store Now, Decrypt Later (SNDL) attacks. For this reason, the Quantum Computing Cybersecurity Preparedness Act (H.R. 7535) requires federal agencies to prepare now to protect National Security Systems. Specifically, government agencies must maintain an inventory of all information technology in use that...
Add Favorite
We Know Your Passwords (Do You?) - Free...
This on-demand webinar exposed: Shocking statistics: We dived deep into the data on password breaches and cyberattacks, revealing the true scope of the problem. Current Threats: Learned about the latest hacking techniques cybercriminals are using to bypass weak passwords and gain access to your systems. The Urgency for Change: Discovered why traditional password-based authentication is no longer enough to keep your data safe. The Solution: Ex...
Add Favorite
Connecting the Unexpected: Scalable Dat...
Thank you for your interest in our Certus Group webinar! During this webinar, attendees learned: How Knowledge Graphs provide a scalable solution for your data structure needs The application of large language models to knowledge graph solutions The diverse use cases supported by Certus Core’s Semantic Knowledge Graph solution The importance of data governance and data standardization in scalability
Add Favorite
Reduce Risk, Enhance Response: Ransomwa...
Every year, ransomware continues to be a persistent and evolving threat in the realm of cybersecurity. As technology advances, ransomware adapts, making it essential for state and local government to stay vigilant and implement robust security measures. The impacts of ransomware extend beyond financial losses, encompassing data breaches, reputational damage, and operational disruptions. Defending your agency against these threats requires proa...
Add Favorite
The Intent to Compromise: Bypassing Fir...
Today’s technology professional needs a detection system that not only blocks any indicator if their site is compromised, but also one that blocks access to malware downloads, and prevents phishing attacks. What if your system could also identify threats while in the planning stage? This is the zone where lookalike detection comes in, and it can proactively prevent attacks before they are even launched. This webinar taught how threat hun...
Add Favorite
AWS Georgia Public Sector Innovation Day
AWS experts are returning to Atlanta! AWS subject matter experts will discuss AWS solutions and how they can help you unleash the powers of digital transformation without disruption by harnessing the proper tools to help your agency thrive. Topics will include organizational intelligence, generative AI, modernization, security, and more.
Add Favorite
Enhancing Unemployment Insurance Integr...
This webinar covered key aspects of Mastercard's approach to fraud prevention, including: Enhancing the accuracy of identity verification processes. Ensuring seamless access to unemployment benefits for legitimate workers. Utilizing existing data to assess the riskiness of claims more effectively. Streamlining the process to fund legitimate claims quickly. Achieving the ideal balance between security measures and accessibility for users.
Add Favorite
Defend, Protect, Educate: Revolutionizi...
Thank you for your interest in our Conceal webinar: Defend, Protect, Educate: Revolutionizing Browser Security for Educational Institutions and Students Webinar Highlights: Understand the rising threat landscape and the risks posed by cyberattacks on educational institutions Learn how ConcealBrowse addresses browser-based threats, combats click rates and neutralizes evolving phishing tactics Explore ConcealBrowse’s role in addressing per...
Add Favorite
VMware's Data Portfolio Overview for SOF Week
During this briefing attendees learned about how VMware Tanzu can support with: Speed and Scale: Faster time to insight due to in-database analytics and AI. Query and data ingestion for petabyte-size data sets. Productivity: Diverse data types on a single platform (structured, semi-structured, unstructured, vector, or geospatialor graph) wherever the data is located. Flexibility: Deployment on any infrastructure type with optimizations for bar...
Add Favorite
Navigating the AI Frontier: A Dispatch...
AI is on the rise worldwide, and its emergence is opening doors for innovative solutions. However, because AI is still growing and developing, many agencies have yet to truly dive into its potential and what it can unlock. Understanding AI’s practical uses and cloud implementation potential is crucial for any federal agency looking to modernize and increase productivity. In this GovExec TV dispatch from Oracle’s Fed Forum, join us...
Add Favorite
Back to Search Begin New Search