Back to Search Begin New Search Save Search Auto-Notify
Discover the Difference: Adobe Connect...
Watch this on-demand webinar to explore the vast possibilities of Adobe Connect with Alistair Lee and Peter Ryce, industry leaders with a wealth of experience in eLearning, webinars, and customer engagement. You will discover how to create a visually stunning and branded virtual space, captivate your audience from the start, and leverage the full range of interactive tools to drive engagement. Lastly, you will uncover the secrets of extending...
Add Favorite
Empowering Statewide Policing through D...
The Maryland State Police is one of the largest agencies utilizing Tableau for data-driven policing on a state level. Attendees of this enlightening webinar received an in-depth Q&A with the agency's Tableau Solutions Architect, Christopher Corea. With 22 years of law enforcement experience and retiring from the agency as a First Sergeant, he is now responsible for creating the Maryland State Police Tableau Center of Excellence and managin...
Add Favorite
Preparing Security Operation Centers Fo...
In this webinar, attendees learned: Limitation of on-premise SIEM and SOAR solutions for SOC Benefits of transitioning to a PaaS SOC model The need to break the Silo Culture How AI/ML is changing the landscape How threat intelligence and community cooperation is changing the game How Google Cloud is redefining what “good” looks like
Add Favorite
Evolving from Disjointed Views to Cohes...
Riverbed's Federal CTO, John Pittle, addressed the difficulties confronting federal IT teams, presented customer use cases and explored how Riverbed’s Unified Observability portfolio offers the necessary visibility across contemporary federal networks. In this webinar, attendees discovered the: Importance of prioritizing visibility, security and cost in network solution selection Hidden expenses in network monitoring tools Impact of zero...
Add Favorite
AO Perspectives: Managing Risks and Str...
Picture this: you're on the brink of securing that crucial ATO approval, but the path is fraught with pitfalls—complex regulations, potential human errors, and the constant specter of cyber threats lurking in the shadows. As an Authorized Official (AO), you're all too familiar with the uphill battle of navigating the complexities and risks of the ATO package approval process while maintaining the resilience of your organization's defense...
Add Favorite
Quantum Readiness: Effective Strategies...
Quantum Computers pose an existential threat to data encryption. In addition, adversaries are already capturing sensitive network traffic for Store Now, Decrypt Later (SNDL) attacks. For this reason, the Quantum Computing Cybersecurity Preparedness Act (H.R. 7535) requires federal agencies to prepare now to protect National Security Systems. Specifically, government agencies must maintain an inventory of all information technology in use that...
Add Favorite
Back to Search Begin New Search