Back to Search Begin New Search Save Search Auto-Notify
Automating the Hardest Part of FOIA: Au...
Audio and video records are among the most time-consuming and complex assets to process for FOIA and public records requests—often creating bottlenecks that lead to growing backlogs and delayed responses. In this webinar, we’ll explore how agencies can use AI as a force multiplier to automate the most challenging aspects of FOIA compliance without sacrificing accuracy, defensibility or public trust.View this on-demand demonstration...
Add Favorite
Creating A Capture Advantage: A Guide T...
Creating a Capture Advantage: A Guide To AI-Driven Capture AI is quickly becoming a competitive advantage in GovCon capture—but only when it’s applied with the right structure, data, and human oversight. Many teams today are experimenting with AI in isolation, using ad hoc tools on top of fragmented data, which limits value and increases risk. At the same time, recent FAR updates are accelerating procurement timelines and raising t...
Add Favorite
Beyond Core Count: Rethinking Processor...
Processor selection for tactical and edge systems has traditionally centered on core count and clock speed, but that model is rapidly becoming obsolete. As missions demand higher performance per watt, mixed workloads and more efficient use of constrained power and thermal envelopes, new processor architectures are reshaping what “performance” really means at the edge. In this joint webinar, Curtiss-Wright Defense Solutions and Inte...
Add Favorite
Fortra February Tips and Tricks Webinars
During these webinars, speakers discussed:Defining an Appropriate Schema: Ensuring your schema is appropriate for meeting CUI, DOD markings, etc. requirementsSchema Simplicity: Why a 3/4-level schema is no longer suitable for meeting requirementsThe Federal "Inventory First" Rule: Tips for conducting a data discovery "sprint" to identify where CUI (Controlled Unclassified Information) is hiding before you write your first policy
Add Favorite
Creative Editing Powered by Intelligent...
Whether you’re new to photo editing or looking to dramatically streamline your workflow, this webinar will get you up to speed and showcase the future of cloud-based photo editing and management.Watch our on-demand webinar to learn about the powerful capabilities of Adobe Lightroom, including web-based editing, seamless syncing across devices and professional tools to elevate your images from capture to final export.Watch this on-demand...
Add Favorite
AI As a Force Multiplier in Investigations
Investigations today are under real pressure. Teams are dealing with growing volumes of digital evidence, limited resources and rising expectations for speed and accuracy. With evidence coming from more sources and in various formats, agencies need faster ways to uncover insight without sacrificing accuracy or transparency.Access this on-demand webinar to learn how agencies are using Veritone iDEMS to work more efficiently and manage evidence...
Add Favorite
From Enablement to Revenue: The Docusig...
Partners joined Docusign for a partner-focused webinar to learn how to turn Docusign into a repeatable growth engine in federal, state, local and education accounts. Key topics discussed include:Docusign Partner Program, simplifiedCertifications and Accreditations That MatterGo-to-Market Use Cases that Create PipelinePartner-Replicable Customer Wins
Add Favorite
Preparing for OMB PQC Reporting: A Prac...
Federal agencies are now required under OMB Memorandum M-23-02 and National Security Memorandum-10 to inventory cryptographic assets, identify quantum-vulnerable algorithms and report progress toward post-quantum cryptography (PQC) readiness. Yet many agencies are unsure what these mandates actually require in practice, how discovery and inventory tools fit into compliance or how to determine whether their current environments provide sufficie...
Add Favorite
10 Properties of Secure Open Source Software
This online training explored why software supply chain security has become a top concern as open-source software now powers the majority of modern applications. Using real-world incidents like Log4Shell, malicious code injected into the Linux Kernel and phishing campaigns targeting PyPI, the session examined how these threats emerge and why agencies are facing increased government guidance and oversight.Attendees learned how to:Identify the c...
Add Favorite
Babel Street Beyond Tier-1: How Regulat...
Attendees joined for an in-depth session on how government agencies and organizations operating in highly regulated industries can leverage Babel Street’s Vendor Risk Intelligence to automate compliance, reduce risk exposure and proactively stay ahead of emerging threats by utilizing always-on advanced screening workflows that deliver true illumination and resilience across the supply chain and vendor ecosystem.In this webinar, attendees...
Add Favorite
Back to Search Begin New Search