Back to Search Begin New Search Save Search Auto-Notify
2024: FAR Part 34, Major System Acquisition
Join Washington DC based, Jennifer Schaus & Associates in the 2024 Webinar Series covering The FAR, Federal Acquisition Regulations. This series features guest speakers who will uncover the important details and nuances of The FAR. Get educated about the rules and regulations in the game of federal contracting. This series is COMPLIMENTARY & RECORDED. Recordings are posted on our YouTube Channel. CORPORATE SPONSORSHIPS of this Webinar...
Add Favorite
From Data to Decisions in Tableau Pulse...
Tableau Pulse is a reimagined data experience that makes data more accessible to everyone regardless of their expertise with data visualization tools. Attendees of this webinar were able to learn how to leverage the power of Tableau AI to deliver data in ways that are more personalized, contextual and smart. During this webinar, attendees were able to: Learn what Tableau Pulse is and how it can fit into your daily workflow Understand how to ge...
Add Favorite
AI-Enhanced Inspections & Work Order Au...
This webinar delved into the invaluable lessons learned and the powerful capabilities unlocked through this venture and implementing it for the state government. We will discuss how AI and Salesforce are redefining efficiency in government operations, particularly in the realms of case management and resource allocation. Key Takeaways: Image Recognition: Confirming descriptions and providing additional details. Data Management: Enhancing clean...
Add Favorite
Microsoft Office Offensive Tradecraft
View this webinar to learn more about: Recent developments such as Mark-of-the-Web Microsoft security controls including trust settings and decision flows Tactics for gaining initial access, lateral movement, and long-term persistence
Add Favorite
Enforce Least Privilege Across Every Endpoint
Almost every cyberattack today involves the exploitation of privileges. Broad privileges and entitlements greatly expand the attack surface and leave your organization extremely vulnerable to security breaches. However, a least-privilege access approach requires that users and programs receive the least amount of permission when required to complete specific tasks. Least privilege is one of the most essential security measures for organization...
Add Favorite
2024: FAR Part 35, Research and Develop...
Join Washington DC based, Jennifer Schaus & Associates in the 2024 Webinar Series covering The FAR, Federal Acquisition Regulations. This series features guest speakers who will uncover the important details and nuances of The FAR. Get educated about the rules and regulations in the game of federal contracting. This series is COMPLIMENTARY & RECORDED. Recordings are posted on our YouTube Channel. CORPORATE SPONSORSHIPS of this Webinar...
Add Favorite
Protecting Your Agency's Data in the Di...
Whether you're a seasoned database administrator or new to SAP ASE, SAP IQ, and SAP ASPE, this webinar provided valueable insights applicable to all levels of expertise. In this webinar, attendees: Gained insights into the security features in SAP ASE, SAP IQ, and ASPE Discovered products, proven strategies, and techniques that enhanced attendees security posture Engaged with Wayne Waldrup our seasoned database expert during our Q&A sessio...
Add Favorite
Integrating SBOM and Vulnerability Resp...
The visibility that a Software Bill of Materials (SBOM) gives into the ingredients that make up software components is critical to understanding cybersecurity risks. But understanding is only part of the solution. Organizations need to be ready to act on vulnerabilities before they impact system security. Attendees joined ServiceNow to examine the synergies between ServiceNow's Vulnerability Response framework and the principles underpinning C...
Add Favorite
Tableau Enablement Series Part 5: Secur...
In today's data-driven landscape, ensuring the security of your analytics environment is paramount. Join our webinar to enhance your Tableau security expertise and explore how cybersecurity principles intersect with Tableau's features to ensure secure data access for your users. During this webinar, attendees learned how to: Step up their Tableau security game: Attendees learned how to leverage Tableau's built-in features to secure their analy...
Add Favorite
Out of Sight Out of Control: Asset Inte...
Asset visibility and control is an unsolved challenge, with a huge amount of the attack surface being assets that are un-agentable or traditionally manageable. Allow Armis and Semperis to enlighten you on how organizations have huge blind spots that lead to unknown and unquantifiable cyber risk. During this complimentary webinar, attendees learned about: Examples of unmanaged and IoT devices that can’t be protected by traditional systems...
Add Favorite
Back to Search Begin New Search