Back to Search Begin New Search Save Search Auto-Notify
Building and Running a Private AI Archi...
During this webcast, VMware discussed the following about private AI:Explore a range of mission use cases for private AIDeploy private AI in air-gapped environmentsMaximize compute efficiency by leveraging digital twin capabilitiesSnap in a range of LLMs, like Hugging Face, for complete flexibility
Add Favorite
In-Building Connectivity for Return-to-...
Experts from Verizon, Ericsson, Leidos & Carahsoft discussed how 5G, private networks, and scalable solutions can support both civilian and defense operations, ensuring secure, efficient and future-ready connectivity.
Add Favorite
RTO Realities - Optimizing Employee Pro...
Carahsoft and Riverbed joined for an interactive webinar featuring Riverbed's Federal CTO Bill Robers, as he shares strategies to optimize IT operations and enhance government efficiency.Attendees learned:Strategies to monitor network activity, pinpoint performance issues, and gain deeper visibility into application and user experienceHow to track increased network and application usage, detect latency, and optimize IT performance as in-office...
Add Favorite
Security, Swings & SecOps: Google Cloud...
Attendees joined Google Security Operations (SecOps) and Arctiq for an immersive session exploring how security leaders and practitioners are reshaping their approach to cloud security in the age of AI and automation. Arctiq shared insights into today’s evolving threat landscape, showcasing how Google Cloud Security’s platform is being used to streamline response, uncover hidden risks, and drive better business outcomes.Key Takeawa...
Add Favorite
F5 GuidePoint Capture the Flag
The F5 and GuidePoint teams hosted an interactive Capture the Flag competition where attendees competed against others to hunt for API vulnerabilities and learn how they work. In this lab and Capture the Flag exercise, attendees learned how to identify and mitigate:Hard-Coded Secrets: Many applications exchange user credentials for a hard-coded token or key. This key allows anyone who knows it to gain access to the application however, many ti...
Add Favorite
Building Resiliency Across Your Endpoints
Ransomware attacks often go undetected for months or even years, with attackers escalating privileges before striking. This makes real-time endpoint visibility more crucial than ever, especially in today’s work-from-anywhere environment. Absolute Security and Forescout discussed how their partnership can help you stay ahead of threats. Together, they offer a powerful solution: the Absolute Connector for Forescout eyeSight, which integrat...
Add Favorite
Advancing Data Quality and Maturity in...
Public safety agencies operate in an environment where data integrity, accessibility, and validation are crucial—especially when operating under a consent decree. As expectations rise around data transparency and accountability, law enforcement must embrace tools that help build a solid data foundation while making analytics accessible across the agency. This webinar explored how the Albuquerque Police Department, under the leadership of...
Add Favorite
AI for Government Summit 2025
The AI for Government Summit brought together government leaders, policymakers, technology innovators, and industry experts to explore the transformative impact of artificial intelligence in the public sector. As the premier event of its kind, the summit served as a platform for showcasing cutting-edge advancements and discussing strategies to address the unique challenges and opportunities AI presents in governance. Attendees explored real-wo...
Add Favorite
Better Together Series: ServiceNow Ente...
In this webinar, attendees learned how ServiceNow supports agencies in optimizing their IT asset estate through a combined deployment of ServiceNow’s Enterprise Architecture (EA) product with our IT Asset Management (ITAM), Hardware Asset Management (HAM) and/or Software Asset Management (SAM) offerings. Key outcomes included: enabling AI-optimized asset planning, ensuring asset alignment to needed capabilities and mission priorities, an...
Add Favorite
Powering Up SOC Security For Federal Agencies
In this webinar, we showcased how combining the power of SentinelOne and VMRay can take your security operations center (SOC) to the next level. Whether you're a SOC analyst, DFIR professional, or part of an incident response team, this webinar provided invaluable insights into improving your detection, analysis, and response capabilities.Key topics included:How recursive dynamic analysis running in an evasion-resistant sandbox uncovers deeper...
Add Favorite
Back to Search Begin New Search