Spot the Phish! Email Security with Splunk
Learn how Splunk Attack Analyzer empowers SLED IT teams to quickly identify phishing threats and automate response actions, reducing manual effort and improving security outcomes. In this webinar, attendees learned:Understand why phishing attacks are increasingly complex and manual analysis is unsustainableLearn how Splunk Attack Analyzer automates threat analysis to save analysts timeSee real-world results showing better detection accuracy an...
The Future Belongs to Learners Series:...
Take your ChatGPT skills to the next level. In this session, participants learned how to use advanced tools - Deep Research, Projects, Data Analysis, Canvas, Connectors, and ChatGPT Agent - to move from simple prompting to structured, repeatable workflows. OpenAI demonstrated how these capabilities helped government teams collaborate, analyze data, and deliver results more efficiently while maintaining enterprise security and compliance.What P...
Geospatial for Tactical Analysis
Snowflake hosted an immersive, hands-on training session designed for public sector professionals to harness their advanced geospatial capabilities for mission-critical analysis. Participants learned to perform bounding searches, co-traveler analysis, and focus area identification to detect activity hotspots. The session also covered advanced visualization techniques, including HEX grids and histograms, path characterization with line-string a...
Employing AI to Bring Order and Value t...
Key topics included:The challenges associated with traditional document management processes and technologyHow advanced technologies like Artificial Intelligence and Machine Learning bring time savings and order to high volume, multi-stage document processingTaking advantage of the resulting improved data to streamline business processes
Early Warning Signals: The Strategic Va...
In today's volatile geopolitical landscape, the U.S. defense sector relies on thousands of Tier 2 and Tier 3 subcontractors for everything from missile systems to advanced AI chips. Yet, most traditional procurement and threat-monitoring tools fail to detect early signals of instability in these vendors, especially when the signals originate from foreign media, regulatory notices, or obscure disruptions buried in unstructured content.This webi...
Building Your AI BD Program for 2026
ChatGPT has become a go-to tool for many in GovCon BD, but using it effectively — and safely — is another story. In this webinar, we’ll demonstrate practical ChatGPT use cases for business development, show how to reduce risks around compliance, accuracy, and security, and then compare those results against secure, purpose-built AI solutions designed specifically for GovCon. You’ll see side-by-side examples and walk awa...
Building Your AI BD Program for 2026
ChatGPT has become a go-to tool for many in GovCon BD, but using it effectively — and safely — is another story. In this webinar, we’ll demonstrate practical ChatGPT use cases for business development, show how to reduce risks around compliance, accuracy, and security, and then compare those results against secure, purpose-built AI solutions designed specifically for GovCon. You’ll see side-by-side examples and walk awa...
From Sensors to Digital Twins: Real-Tim...
SAS and partner subject matter experts showed an insider’s view of the tools and strategies that some leaders in flood management are already deploying to better protect their citizens, as well as case studies that show how these approaches work in real-world scenarios such as: Rapid population growth, intensifying weather events, and legacy infrastructure are driving urgency for smarter flood management solutions. Local governments may...
Using Real-Time OSINT to Defend Against...
During this session, attendees:Learn how to aggregate, analyze, and act on open-source intelligence to detect threats earlier.Discover how to correlate cyber indicators with physical incidents for a unified risk picture.See real-world use cases of OSINT enhancing decision-making and operational readiness
Unlock the Power of OpenShift Virtualiz...
Carahsoft and Red Hat hosted an interactive virtual training that empowered IT teams to modernize operations and strengthen OpenShift skills. With growing demands for agility and efficiency, this hands-on session allowed participants to gain real experience in a live sandbox environment while learning best practices from Red Hat certified instructors.This training helped attendees:Build technical confidence through guided exercisesStreamline w...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.