Back to Search Begin New Search Save Search Auto-Notify
Better SecOps: Unifying Exposure and Th...
Government agencies bear a huge responsibility for protecting citizens’ sensitive data and defending their critical infrastructure from attack. Effective protection depends on a holistic, accurate understanding of data, assets, and vulnerabilities, but traditional security operations tooling makes it challenging to get that integrated view. Instead, teams struggle with data sitting in disconnected systems and inefficient manual processes...
Add Favorite
Accessibility & Forms: Building Better...
In the U.S. and Canada, approximately 1 in 4 adults has a disability. For all government agencies, ensuring equal access to services should be a critical goal incorporated into IT modernization plans. As expectations for seamless self-service and intuitive digital experiences rise, meeting minimum standards is no longer sufficient; accessibility must stand as a cornerstone of digital trust and citizen equity. However, many organizations are un...
Add Favorite
Critical Recurring GovCon Deadlines and...
Overview This FREE webinar will offer attendees an overview of the recurring compliance requirements government contractors must address each year to maintain audit readiness, protect cost recovery, and support operational alignment. The session will cover key areas such as FAR 52.216-7 billing and rate requirements, policy and procedure updates, internal reviews, annual training obligations, SAM registration, cybersecurity compliance, Indepen...
Add Favorite
Modernizing Government Data Governance...
Attendees joined us for a live demo to see how agencies can strengthen decision-making, streamline compliance and improve cross-team collaboration through trusted data—without added complexity.During the webinar, attendees learned how the Data Integrity Suite for Government:Speeds time-to-value with a configurable, no-code framework that adapts to diverse agency needsAccelerates secure SaaS procurement and deployment by leveraging govern...
Add Favorite
Continuous AI Monitoring for Critical I...
Configuration and infrastructure drift — untracked deviations from the intended state — have become a silent driver of outages and security incidents in critical systems. When drift goes undetected in interconnected infrastructure, a small misconfiguration or manual change can trigger cascading failures that spread across networks, cloud platforms, and operational systems.View the on-demand webinar to learn how continuous monitorin...
Add Favorite
From Threat to Response: How CIS MDR Pr...
U.S. State, Local, Tribal and Territorial (SLTT) government organizations face unique cybersecurity challenges: limited staffing, decentralized IT environments, budget constraints and an ever-evolving threat landscape. These realities often leave teams overwhelmed and under-resourced, making it difficult to detect, respond to and recover from cyber incidents effectively.During this webinar, attendees learned:How CIS MDR provides accurate, cont...
Add Favorite
Concurring complexity: Modernizing your...
This webinar explored how higher education institutions can streamline identity management in complex IT environments. SailPoint experts discussed the challenges created by multiple affiliations—such as student-employees and alumni-faculty—and shared strategies for managing overlapping roles effectively.Attendees learned practical approaches to centralizing identity data from multiple authoritative sources, automating access proces...
Add Favorite
Accelerating AI in State and Local Gove...
State and local governments are increasingly adopting Artificial Intelligence (AI) to modernize operations, improve citizen services, and strengthen public safety. During this post-launch AI Security webinar, Zscaler explored how agencies can embrace AI innovation while managing the growing risks related to Shadow AI, data exposure, and regulatory compliance through a Zero Trust approach.The session highlighted how Zscaler supports secure and...
Add Favorite
The Browser is the New Campus: Securing...
Is your most used platform your biggest blind spot? A student logs in from home to submit an assignment and a teacher reviews grades from their tablet. Meanwhile, multiple cloud apps, extensions and web tools are running—completely unmanaged.In today's digital classroom, learning doesn't happen in the classroom—it happens in the browser. Assignments, collaboration, communication and assessments all live online. Yet most school secu...
Add Favorite
From Detection to Decision: Modern Coun...
Unauthorized drone activity near public events, utilities, and transportation corridors is creating new challenges for community safety and operational continuity. Public-sector organizations are increasingly seeking ways to improve airspace awareness without disrupting existing operations or governance frameworks.With this AirMatrix webinar, your agency can learn:How unauthorized drone activity impacts public safety, critical infrastructure a...
Add Favorite
Back to Search Begin New Search