Back to Search Begin New Search Save Search Auto-Notify
Digital Transformation: Adhere, Comply,...
Join a fireside chat with industry leaders providing insight and perspective on the Executive Order 14028 and the state of cybersecurity in the Federal government. Improving the Nation's Cybersecurity based on subsequent guidance from CISA, United States Digital Service, Federal Risk and Authorization Management Programs and the National Security Agency. During this on-demand webinar, attendees gained knowledge on: How a Cloud Native Applicati...
Add Favorite
AWS Texas Public Sector Innovation Day
AWS and Rackspace hosted attendees and subject-matter experts in Austin, TX for the first ever 2024 AWS Texas Public Sector Innovation Day. Attendees of this event enjoyed a day filled with insightful discussion and invaluable knowledge shared by industry leaders and experts. Attendees of this event listened to subject-matter experts discuss the following topics: Seamless cloud migration Artificial Intelligence in the Public Sector The power o...
Add Favorite
Level Up Your Excel with Alteryx
Thank you for your interest in our Alteryx webinar: Level Up Your Excel With Alteryx Tired of repeating the same manual Excel tasks every month/week/day? Need a better toolkit that can scale with your larger data? Want an easier tool that helps teach you new analytic techniques? This short demo covered the following topics: Converting your manual processes to enterprise grade Automation of routine data tasks Working with larger data sets Upski...
Add Favorite
How to Leverage AI to Optimize Your SOC...
Security Operations Centers struggle to keep pace with modern cybersecurity threat requirements. The volume and speed of threats (IOCs and IOAs) are well beyond the processing capabilities of even experienced security analysts, and this constraint doesn’t factor in the cost of these systems, which are expensive to buy, integrate and maintain.In this webinar, Tracy Williams from Anomali discussed the application of innovative AI technolog...
Add Favorite
Dual-Use Technology: Accelerating Capab...
In an era where technology advancements are both rapid and revolutionary, distinguishing between civilian and military applications poses significant challenges and opportunities for national security, foreign policy, and global technological leadership. This webinar delved into the intricacies of dual-use technology, spotlighting the urgent need for innovative approaches to identify, regulate, and leverage these technologies in bolstering sec...
Add Favorite
Modernizing Citizen Engagement through...
Attendees listened as our experts shared examples of how cities and counties across the country are leveraging the Salesforce platform and our 311 solution, Nexus 311, to easily meet the unique needs of their citizens. They also heard about how our solution can help improve the experience for your staff and citizens by taking a "no wrong door" approach to your Citizen Engagement solution. Key Learning Objectives Included: Modernize citizen se...
Add Favorite
Strengthening ICAM Solutions with AAL3...
Attendees of this webinar learned how to: Strengthen their Zero Trust identity posture Increase IT productivity and reduce downtime Unify and streamline your user's authentication experience
Add Favorite
State Government CX Automation Out-of-the-Box
Modernizing and digitizing government services is a complex task. Citizens often have a hard time finding the right agency or information they need, processes are lengthy, and often deal with sensitive data, and agencies are required to meet stringent privacy and security standards and regulations. Today’s agency leaders are making services more accessible, easy to navigate, and focused on providing quick and effective answers by establ...
Add Favorite
Create Resilience in Your Supply Chain:...
In this webinar, attendees learned about: Exploring how AI and human oversight can improve transparency Identifying ESG issues that have financial, reputational and compliance risks Combating greenwashing and social washing risk with an outisde-in approach to data collection Surface sector-level themes to inform the due diligence process Leveraging sensing data to isolate biodiversity risk
Add Favorite
Bolster Identity Security with Password Safe
Attacks on identities, especially those with elevated access and privileges, are at an all-time high. Yet agencies are challenged with securing significantly more privileged accounts and supporting vastly larger decentralized networks than in years past. In this perimeter-less, remote world, organizations need a higher degree of privileged access protection that eliminates the ability for attackers to gain access and move laterally. A zero tru...
Add Favorite
Back to Search Begin New Search