Secure Access, Trusted Intelligence: Tr...
Rapid, accurate access to real-time data is critical for decision dominance in today’s ever-evolving threat landscape. Military and government personnel need new ways of keeping pace with the digital landscape. Open-Source Intelligence (OSINT) and Artificial Intelligence (AI) are critical sources for uncovering insights and staying ahead of the adversary. However, that nature of OSINT and AI means the data and the systems they stem from...
2025: DFARS Part 228, Bonds and Insurance
Join Washington DC based, Jennifer Schaus & Associates in the 2025 Webinar Series covering The DFARS, Defense Federal Acquisition Regulations Supplement. This series features guest speakers who will uncover the important details and nuances of The DFARS. Get educated about the rules and regulations in the game of federal contracting. This series is COMPLIMENTARY & RECORDED. Recordings are posted on our YouTube Channel. CORPORATE SPONSO...
Leveraging Data Automation for Casework...
Each time a caseworker or home visitor enters a family's home, a multitude of forms are completed and a large amount of data is collected. Data captured and reported from these forms is often limited to check boxes and drop-down menus, missing valuable context about a family that caseworker notes provide. What if there was an easy way to capture, track, and report data from case notes to improve the lives of families and reduce documentation b...
Learn How to Streamline Cloud Security...
As cloud environments continue to grow in complexity, security teams are seeking smarter ways to manage risk and remediation. In this webinar, Wiz and Armis explored how their joint solutions are reshaping cloud security operations.Watch the recording to learn how Armis and Wiz work together to:Prioritize security risks with AI-driven insightsAutomate remediation ownership across DevOps, cloud and security teamsReduce manual effort with automa...
Modern Software Delivery for Government...
Federal agencies, currently under pressure to deliver software quickly with smaller staff and tighter budgets, need tools that help them move faster while staying in control. Traditional deployment methods often bring unnecessary risk and delays, making it harder to respond quickly to critical mission demands.LaunchDarkly & Carahsoft hosted an insightful session about how feature management is revolutionizing software delivery for governme...
How to Build and Optimize a Transportat...
Thank you for your interest in our Roundtrip Webinar:How to Build and Optimize a Transportation Network Unfortunately, this webinar is now over. We're sorry we missed you! Attendees of this webinar listened to subject-matter experts discuss how to:Move beyond ad-hoc vendor partnerships to build a scalable transportation community that reduces delays, cuts costs, and improves program equity.Align stakeholders across programs, systems, and provi...
Smart Labor Costing A Lifeline in Econo...
With labor costs as their largest expense, agencies must be proactive in managing workforce decisions. This webinar explored how real-time labor costing provides a critical tool for navigating both stability and uncertainty. By leveraging better insights, agencies can maintain service levels, manage pension liabilities, and make data-driven decisions that align with long-term fiscal health—ensuring they are prepared for whatever comes ne...
The South Fork Dam Breach and Johnstown...
The 1889 breach of the South Fork Dam, which caused the infamous “Johnstown Flood,” remains the deadliest dam failure in US history. The Commonwealth of Pennsylvania built the dam in the mid-1800s as part of a cross-state transportation network, and the dam’s design and construction met the contemporary standard of care. However, decades of neglect left the dam in disrepair until a group of Pittsburgh tycoons hastily rebuilt...
Guarding the Guardians: Enabling Safe,...
This session explored how ConcealSearch empowers professionals to safely perform research from anywhere in the world without the risk of attribution or exposure.Our featured speakers discussed: Ensuring safe, anonymous online research for investigators, journalists, analysts and researchers through ConcealSearchConducting sensitive investigations without leaving a digital trace or exposing your identityRedefining secure research with a managed...
Strengthen National Security With C3 AI...
In today’s rapidly evolving national security landscape, teams must continuously sense, interpret, and act on vast, disparate, and siloed data sources at the speed of relevance to achieve strategic superiority. However, legacy processes are often slow, vulnerable to adversarial disruption, and unable to incorporate all available intelligence — resulting in delayed or suboptimal decisions that may compromise mission success. C3 AI d...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.