State Government Licensing Simplified:...
Watch this Freshworks webinar on-demand to learn about how you can increase the number of professional licensees, resulting in more jobs, and generate more state revenue by doing the below:Creating a Self Service Online Application ProcessAutomating Data EntryReducing Inbound Calls and Emails
Under Pressure: Navigating Federal Comm...
Today’s federal communications teams are under more pressure than ever to deliver high-impact results with significantly fewer resources. Political transitions, executive orders, shrinking budgets, and growing public distrust in the media are fundamentally reshaping how agencies operate, all of which make the work of communicators more vital than ever. Watch our on-demand webinar where we explore how federal communicators can navigate ch...
WIDS in the Public Sector for Today's Threats
As unmanaged wireless devices continue to pose significant risks to classified environments, selecting and deploying an effective Wireless Intrusion Detection System (WIDS) has become an important responsibility. Learn about the challenges military decision-makers face when evaluating and implementing WIDS solutions for today’s complex threat landscape. Join us to explore: A clear framework for evaluating WIDS capabilities aligned with D...
Deploy Faster, Operate Smarter: OpenShi...
Red Hat hosted an RTX-exclusive virtual event on June 27th to showcase how Red Hat OpenShift Virtualization empowered RTX to accelerate deployments, optimize operations, and drive smarter solutions in a rapidly evolving technology landscape.
Tableau Calculations Explained: Masteri...
Unlock the full potential of your data with Tableau Calculations Explained—a practical webinar designed to help you confidently use Tableau’s most powerful features for organization-specific logic. Whether you're building dashboards or analyzing data for business decisions, understanding calculations is the critical skill to extracting deeper insights. In this session, we broke down the different types of Tableau calculations...
Accelerating AI from Experimentation to...
This webinar showed how Domino Data Lab and Latent AI enable mission-ready AI by orchestrating end-to-end MLOps workflows, accelerating model development, optimizing edge deployments and ensuring continuous trust and compliance.Attendees learned how to:Understand how Project AMMO matured into an Indo-PacCom-ready capability, and what's next for Navy-wide adoption.Deliver high-performing, explainable models to edge environments with continuous...
Responsible AI in Practice
As AI becomes increasingly embedded in the daily operations of Canada’s public institutions and essential services, from federal and provincial governments to post-secondary education and banking, there is a growing need to ensure AI is deployed ethically, transparently, and in alignment with Canadian values and legal frameworks. Watch the recording for a focused and actionable webinar on implementing responsible AI across Canadian conte...
Reducing Your Cyber Exposure With Armis...
Attendees joined Armis experts as they explored how Armis Centrix™ embraces powerful collaboration with existing EDR, NAC and SIEM/SOAR. Attendees discovered how this synergistic CTEM approach transforms the security stack into a unified force delivering unparalleled asset intelligence and proactive threat mitigation to significantly reduce cyber exposure. During this complimentary webinar, attendees learned about:Unified Asset Intellige...
Navigating Return-to-Office Mandates: W...
As organizations face return-to-office mandates, many are navigating a complex process involving leadership decisions, space planning, and employee needs.Watch this on-demand webinar on how to better prepare for return-to-work requirements. The session focuses on the individuals responsible for managing this transition from start to finish equipping them with tools to inform all parties involved, share reports and data with leadership, and red...
When AI Learns to Breach and Quantum Le...
As public and private sectors accelerate AI adoption, they're deploying it atop cryptographic foundations built for a human-centric world. This results in a surge of non-human identities such as service accounts, agentic AI, machine-to-machine workflows, many authenticated by expired, weak or untracked keys. These digital actors now outnumber humans across critical systems and often hold far more privilege. When they fail or are exploited, the...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.