TX Practitioners Workshop - Software ...
Join ServiceNow for a dedicated technical practitioners workshop focused on how to use ServiceNow’s Software & Hardware Asset Management (SAM & HAM) to enable agencies to optimize costs and utilization of their asset investments to reduce spend, mitigate asset risk, and automate the full asset lifecycle with workflow—on a single platform. Register now to hear directly from our asset management experts and expect to take aw...
Swing into Data: Insights at the Tee
Join Dell Technologies and Carahsoft at this exclusive event for organizations interested in data management, analytics, AI initiatives, and cutting-edge storage platforms, with opportunities to lead data governance and risk mitigation. Discover how we empower federal agencies to harness the full potential of their data, from raw data collection to actionable insights. Our solutions can dismantle data silos, streamline workflows, and superchar...
Create Resilience in Your Supply Chain:...
In this webinar, attendees will learn about: Exploring how AI and human oversight can improve transparency Identifying ESG issues that have financial, reputational and compliance risks Combating greenwashing and social washing risk with an outisde-in approach to data collection Surface sector-level themes to inform the due diligence process Leveraging sensing data to isolate biodiversity risk
Alteryx and Bronson Analytics: Hands-on Lab
This hands-on lab will be an interactive session on conducting end-to-end analysis using Alteryx. Attendees will learn how all levels of Canadian Government are utilizing data-driven approaches to enhance their operations, including reconciliation, risk assessment, and data deduplication. Attendees will learn techniques such as: How to import and merge different sources of data How to maintain data quality through exploratory analysis How to e...
CNAPP - Secure Your Cloud Environment W...
Register for this webinar to learn: Why organizations are adopting CNAPP over traditional point solution tools How to achieve consistent multi-cloud visibility The role of Security Graphs in prioritizing risk remediation The simplicity of implementation and the speed to demonstrate value
Building a CMMC Compliant Cyber Program...
Join Cytellix, Carbon Black and Carahsoft on March 13 for a panel discussion where we will touch on the following topics: CMMC audits are set to start Q1 2025 - are you prepared? Is there a “fast pass” model to help get ready for audit? Are there any tools or technology that can serve as an alternative to traditional consulting services?
Exploring the Value of Responsible AI f...
Artificial Intelligence (AI) has the potential to make our risk detection, communications and response systems faster, more efficient and smarter. But first organizations must understand how this technology can integrate with existing systems and support analysts before AI can bring tangible value for critical event management. Register now for a complimentary webinar to learn key considerations for every risk practitioner navigating the AI pa...
Exploring Software Risk Management for...
Securing sensitive data and critical systems is crucial. Software risk management and application security strategies identify and mitigate vulnerabilities, ensuring compliance with industry standards for enhanced public sector cybersecurity. Join Synopsys experts to understand how Application Security Posture Management (ASPM) and Software Risk Management (SRM) can help your organization more effectively comply with software security requirem...
Adobe Experience Workshop: Create, Shar...
To ensure our nation’s security, information must be current, accurate, and delivered synchronously across multiple screens, channels, and domains at the speed of mission readiness. Join Adobe and your fellow content creators and communicators from across the Department of Defense ecosystem as we convene on October 5th to discuss the full content management lifecycle, from ideation to publication, including how to: Create content that st...
Protect Your Enterprise with AdminStudi...
The task of identifying relevant vulnerabilities and threats that apply to your installed software—while also determining their impact, urgency and priority—is dynamic and complex. It's a task often shouldered by a security team or individual. But what if there was a way to streamline this process and ensure high-quality deployments with the least risk while also focusing on the applications that must be prioritized to achieve stro...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.