Back to Search Begin New Search Save Search Auto-Notify
How to Enforce Least Privilege Across E...
Endpoint security serves as the frontline defense in protecting your institution’s network from a wide array of threats originating from devices that connect to the enterprise network, such as laptops, smartphones, and tablets. These endpoints are often the targets of cyberattacks as they provide access points to the organizational network, making them vulnerable to malware, ransomware, and more. By securing these endpoints, institutions...
Add Favorite
Maximize Cloud Security with AWS and Wiz
This webinar explored how AWS's built-in security tools and Wiz's Cloud-Native Application Protection Platform (CNAPP) work together to enhance cloud security. AWS services like Config, Security Hub and KMS provide a strong foundation for visibility, compliance and monitoring, helping organizations track resource changes, centralize logging and manage encryption. In this session, we showcased how Wiz extends AWS's capabilities, delivering deep...
Add Favorite
Navigating AI in the Modern Landscape w...
We invite you to view our complimentary Demo Desk: Navigating AI in the Modern Landscape with Fortinet. Learn more about the ever-changing landscape of technology regulations in the modern world. In the first demo of our series, we looked into what AI has accomplished, what's next for AI and how your organization can adapt and support others after the wave of recent policy changes. We also reviewed the new administration's impact and how Forti...
Add Favorite
Zoom for Government Webinar Series - Ma...
Zoom for Government is for your mission. We enable the federal mission through an easy-to-use and innovative collaboration platform. Watch our March sessions on-demand exclusive to the public sector!
Add Favorite
Built for Government: How Embedded Endp...
Did you know that Absolute’s endpoint security solution is embedded directly into government-used device firmware, offering unique advantages for enhancing control, resilience and compliance?In this session, we explored how agencies use Absolute to:Enforce robust security policiesDetect and recover from IT disruptionsStrengthen cyber resilience with persistent endpoint monitoring, automated repairs and geofencing for secure operations
Add Favorite
Building Accessible Dashboards
This insightful webinar was on the art of creating accessible data visualizations. Key principles for designing dashboards that cater to a wide range of user needs were taught, ensuring that everyone can see and understand data effectively. In addition to these best practices, we took a tour of the latest and upcoming Tableau features on accessibility, highlighting the enhanced usability experiences.During this webinar, attendees learned:Essen...
Add Favorite
Fortifying the Future: Protecting 3rd a...
As supply chains become increasingly digital and interconnected, cybersecurity risks from partners and suppliers are evolving at an alarming pace. Cyberattacks targeting 3rd and 4th party supply chain networks—ransomware, data breaches, and third-party vulnerabilities—can have devastating consequences on your company. With more Governments looking to increase regulations to ensure organisations secure 3rd and 4th party providers, o...
Add Favorite
AI on Your Terms: Scalable & Secure Sol...
Your AI journey is only just beginning. Learn how adopting advanced artificial intelligence solutions can drive faster problem-solving, improve decision-making and deliver meaningful results for your organization with Red Hat OpenShift AI. Watch this recording for an in-depth discussion on Red Hat OpenShift AI and how it can help: Reduce AI Infrastructure Management: Enable teams to focus on data exploration and app development with on-demand...
Add Favorite
Community Templates Technology with Clariti
In this on-demand webinar Clariti shares a game-changing new cloning feature that allows you to replicate other organizations’ permit-type configurations to save time. They'll show you how easy it is to clone thousands of best practice permit types, rules, steps, and workflows built by leading cities and counties like Placerville CA, Albany NY, Melissa TX, and more. You'll learn how Community Templates works, and how you can:Increasing i...
Add Favorite
Building Resilience in Tribal Organizat...
This webinar dove into the dynamic realm of data analytics and its transformative potential for tribal communities with Splunk. Speakers also discussed Splunk’s revamped tribal commitment and new pricing models specifically for tribal organizations. Attendees who joined learned:How Tribes are using Splunk to identify, track and visualize emerging security threatsHow Splunk has revamped our commitment to the Tribal community via unique pr...
Add Favorite
Back to Search Begin New Search