Back to Search Begin New Search Save Search Auto-Notify
Voice Security in the Public Sector: De...
The voice channel is the most under-protected entry point into public sector organizations, and attackers know it. From AI-powered vishing and social engineering to spoofed calls, robocalls, and voice spam storms, adversaries are weaponizing telephony to bypass traditional defenses and compromise sensitive data. During this exclusive webinar, hear from experts who will expose the current voice threat landscape, reveal attack tactics and trends...
Add Favorite
Five Unhealthy Mistakes to Avoid When A...
Topics covered in this webinar:Neglecting a Formal Archiving StrategyMerging Patient DataCreating Mini EHRsStaying Loyal to your Original LDA VendorArchiving With the Incumbent EHR
Add Favorite
Agentic AI workshop: Train your first c...
Think AI model training is only for data scientists? Think again. Join this free hands-on workshop where you'll train and fine-tune a real cybersecurity model — no advanced math or data science degree required. As a cybersecurity professional, you should be training AI models. Your expertise is exactly what's needed to build effective AI-powered defenses. In this 90-minute, interactive session, you’ll learn some of the same skills...
Add Favorite
Fighting Fraud Without Friction
Plum is the first “built for government” identity validation solution. It calculates an applicant's risk score using tens of thousands of data points to identify stolen and synthetic identities, bots, drop houses, mules, suspicious devices, and foreign and domestic fraud organizations. Watch this on-demand webinar to discover best practices that governments should consider to improve program safeguards. Specifically, viewers will l...
Add Favorite
Faster Investigations, Smarter Seizures...
Discover how AI surfaces hidden connections, translates massive amounts of unstructured data into insights and gives investigators a decisive edge in tracking and apprehending criminal actors.In this webinar, attendees learned:Ways AI surfaces and prioritizes suspects, saving valuable time by finding “needles in haystacks”Techniques to illuminate criminal networks and map hidden relationships between people, events and locationsHow...
Add Favorite
Intelligent Data for JADC2: Powering Mi...
The Department of War faces immense pressure to enhance operational effectiveness, yet critical initiatives like Joint All-Domain Command and Control (JADC2) are complicated by overwhelming volumes of fragmented, siloed data and persistent challenges with outdated legacy systems. These issues hinder efficient data migration, leave vital information unprepared for scalable AI and cause modernization delays that impact mission readiness.Unlockin...
Add Favorite
Spot the Phish! Email Security with Splunk
Learn how Splunk Attack Analyzer empowers SLED IT teams to quickly identify phishing threats and automate response actions, reducing manual effort and improving security outcomes. In this webinar, attendees learned:Understand why phishing attacks are increasingly complex and manual analysis is unsustainableLearn how Splunk Attack Analyzer automates threat analysis to save analysts timeSee real-world results showing better detection accuracy an...
Add Favorite
The Future Belongs to Learners Series:...
Take your ChatGPT skills to the next level. In this session, participants learned how to use advanced tools - Deep Research, Projects, Data Analysis, Canvas, Connectors, and ChatGPT Agent - to move from simple prompting to structured, repeatable workflows. OpenAI demonstrated how these capabilities helped government teams collaborate, analyze data, and deliver results more efficiently while maintaining enterprise security and compliance.What P...
Add Favorite
Geospatial for Tactical Analysis
Snowflake hosted an immersive, hands-on training session designed for public sector professionals to harness their advanced geospatial capabilities for mission-critical analysis. Participants learned to perform bounding searches, co-traveler analysis, and focus area identification to detect activity hotspots. The session also covered advanced visualization techniques, including HEX grids and histograms, path characterization with line-string a...
Add Favorite
Employing AI to Bring Order and Value t...
Key topics included:The challenges associated with traditional document management processes and technologyHow advanced technologies like Artificial Intelligence and Machine Learning bring time savings and order to high volume, multi-stage document processingTaking advantage of the resulting improved data to streamline business processes
Add Favorite
Back to Search Begin New Search