Back to Search Begin New Search Save Search Auto-Notify
Optimize Mobile Asset Management with A...
Federal law enforcement agencies operate in fast-moving, complex environments where managing mobile assets — vehicles, field equipment, mobile IT systems — is critical to mission success.In this session, attendees learned how ServiceNow’s AI platform delivers real-time visibility, automates inventory tracking, and predicts maintenance needs to maximize asset readiness and security.Insights on using AI to predict maintenance n...
Add Favorite
Celebrating 29 Years of 311's Evolution...
Attendees joined us for this special anniversary webinar as we explored the incredible journey of 311’s transformation from landlines and legacy phone banks to today’s smart, user-friendly digital front doors. Attendees heard from government innovators and CSA 311 tech experts as we reflect on the past, assess today’s tech landscape, and envision what the next era of 311 might look like.
Add Favorite
Closing the Mobile Threat Blindspot: Wh...
Your SOC may have SIEM, SOAR, and EDR in place - but are you still blind to mobile threats? Attackers increasingly target employees through their smartphones with phishing, smishing, malicious apps, and social engineering tactics that traditional security tools miss. Without mobile threat intelligence, your organization is exposed to breaches that start at the human layer. In this webinar, attendees learned how to eliminate the blindspot and f...
Add Favorite
Education Cyber Resilience: A 4-Part Se...
Attendees joined us for an exclusive webinar series where Cisco and Proficio will explore today’s top cyber threats in education and how your institution can prepare. From real-world ransomware case studies to practical resilience planning, we’ll highlight proven strategies to strengthen security in both K–12 and higher education. Attendees gained insight into:Current threat trends in education, including ransomware-as-a-serv...
Add Favorite
Safeguarding Your Data: Meeting CMMC Le...
Participants attended our Google Workspace CMMC webinar to learn how your organization can achieve CMMC Level 2 compliance and safeguard your sensitive data. With the upcoming accreditation requirements from the Department of Defense, it's more critical than ever for the Defense Industrial Base to secure Controlled Unclassified Information (CUI). Attendees joined us to learn about CMMC and why it's important, demonstrate how to leverage Google...
Add Favorite
Zero Trust for Justice Systems: Stop Da...
Cyberattacks are increasingly targeting justice systems, threatening sensitive case records, legal documents and even the identities of witnesses and victims. Many organizations still rely on outdated perimeter defenses, leaving critical systems and individuals at risk. Zentera and Carahsoft were joined on September 30th at 2 PM EST for an in-depth session on how Zentera’s “Collaboration Chambers” deliver Zero Trust security...
Add Favorite
Strengthening Federal Cybersecurity wit...
In response to Executive Order 14028, federal agencies are accelerating their adoption of Zero Trust architectures to modernize and secure their IT environments. A critical yet often overlooked component of this transformation is Encrypted DNS, a foundational element that enhances visibility, control and resilience across distributed networks. During this webinar, Infoblox’s Chief DNS Architect, Cricket Liu, and Cybersecurity Strategist,...
Add Favorite
Stronger Together: Modernizing Records...
Key topics include: “Why” – Applying lessons learned to state and local government challenges Benefits of adopting more Microsoft 365 tools for data governance Approach to implementing tools – Discover, Design, Migrate, Train, Maintain Tools available in the Microsoft 365 universe for data governance and security, including AvePoint add-on tools to improve functionality
Add Favorite
Scaling Generative AI Today: Open, Effi...
Gaudi 3 is purpose-built to meet the demands of modern AI and GenAI workloads, enabling faster, more efficient scaling with open, flexible solutions that reduce costs and avoid vendor lock-in.This webinar covered: How Gaudi 3 accelerates GenAI workloads with industry-leading performance.Cost-saving benefits of open, vendor-agnostic AI infrastructure.Integration with popular frameworks like PyTorch and TensorFlow.
Add Favorite
Secure by Design: Building Resilient Sy...
With global supply chain attacks escalating, nation-state threats targeting critical infrastructure and AI generating code faster than we can secure it, the real challenge isn't avoiding threats—it's building systems that can withstand them. GitLab hosted a webinar on October 2nd for Cybersecurity Awareness Month to tackle the security challenges that keep government CISOs awake at night. During this fireside chat with GitLab's CISO, Jos...
Add Favorite
Back to Search Begin New Search