AI-Powered Deception: Defend Against Ne...
Artificial intelligence (AI) revolutionizes multiple industries, providing unprecedented automation, analytics and decision-making capabilities. However, the rapid advancements in AI technology have also led to the emergence of sophisticated social engineering attacks, posing significant challenges to individuals, businesses, governments and healthcare. During this session, we explored the impact of AI on social engineering and highlighted the...
OT Modernization Through Collaboration,...
Interoperability is critical to reach a truly modernized advanced compute platform. Current OT environments are typically built for purpose, which often makes it difficult to get data. Limiting the use of your data puts you at a great disadvantage as automation and AI become the norm. In this short webinar with experts from Red Hat and CSI, get:Guidance on how to target software-defined controls in a manageable way, so you can scale, be agile,...
Red Hat Enterprise Linux Virtual Roundt...
Join us for an on demand virtual roundtable featuring valuable insights into the strategic value of Red Hat Enterprise Linux 10 as the foundation of your IT infrastructure vs. Linux alternatives. During this on demand event, our panel of experts take questions from our audience and discuss:RHEL’s innovation and support spanning AI-powered features to developer resourcesThe value of RHEL’s enterprise-grade OS security, stability and...
How to Avoid the Common Pitfalls of the...
Overview This FREE webinar will offer attendees an overview of the Service Contract Act and the regulatory requirements that determine compliance for federal service contractors. The session will explain which contracts are subject to the SCA, how to correctly classify service employees, and what contractors must do to meet wage determination, fringe benefit, and recordkeeping obligations. Participants will gain practical guidance on addressin...
Eliminate Attack Pivoting with Network...
Consequence boundaries connect networks with dramatically different worst-case consequences of compromise – for example, IT networks connected to base microgrids, building automation or other OT networks. At consequence boundaries, we must eliminate the possibility of online attacks pivoting into our high-consequence networks – an emerging space of network engineering. Attendees joined Waterfall Security and Carahsoft to explore ho...
Modernizing Public Health: Why Governme...
Public health and human services programs form the front line of community well-being yet they’ve been chronically underinvested in and technologically left behind. While hospitals and clinics have benefited from decades of EHR funding and modernization, outreach-based programs that operate in homes, schools, and neighborhoods still rely on outdated systems, spreadsheets, and paper forms.Watch the on-demand webinar to explore how a new g...
Simplify Your Network While Maximizing...
In this on-demand webinar, Arista Networks experts share insights on leveraging cloud networking solutions to meet mission-critical demands. Discover how agencies are modernizing their infrastructure with Arista's advanced automation, visibility and secure capabilities. Watch now to learn best practices and proven strategies for building resilient, future-ready networks. Key Takeaways:How Arista's EOS and CloudVision deliver automation and agi...
Zero Trust: Reinforcing Cyber Resilienc...
In today’s cybersecurity landscape, maintaining trust boundaries is critical. This on-demand webinar dives into Zero Trust principles and architecture tailored for Federal health environments. Learn practical steps for adoption, discover solutions to common deployment hurdles, and explore how Zero Trust secures sensitive patient data while maintaining operational efficiency in military healthcare operations.Attendees learned:The core pri...
Telemetry with AI: Modernizing IT for t...
The Department of Health & Human Services (DHHS) faces mounting pressure to modernize systems, strengthen cybersecurity and deliver effective and reliable public health services—all while ensuring compliance with Executive Order 14110 on safe, secure and trustworthy AI. On January 14th, Dynatrace & Red Hat experts demonstrated how AI-powered tools improve the DHHS' ability to provide safe, accessible and trustworthy public health...
Modern Automation for Canadas Regulated...
As organizations continue to modernize legacy systems, the need to integrate on-premise applications with emerging cloud technologies has never been more critical. Across Canada’s most highly regulated sectors — from federal and provincial governments to financial services, healthcare, energy, and education — digital transformation must strike a balance between innovation with compliance, sovereignty, and control. Attendees j...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.