Optimize Your Digital Document Workflow
In today’s hybrid digital world, many organizations are still held back by legacy manual, paper-based workflows that require a revamp. Adobe Acrobat Pro can help address the hurdles that are often encountered in sending out documents for signature, creating forms, and digitizing older content. Watch the on-demand webinar to see how Adobe Acrobat Pro can help update day-to-day processes to keep up with increased demand for versatile digit...
Streamlining FOIA Request Response with...
Federal agencies received a record high of information requests in 2022. Specifically, FOIA requests surged 30% from 2022 to 2023, straining the staff and budgets of agencies that need to comply with these requests. Technology that automates these manual processes is imperative to streamline workflows and boost citizen experience. As an eDiscovery and public records request management technology leader, CloudNine helps agencies decrease data r...
How and Why You Should Build Resident P...
During this webinar, attendees explored the challenges states face when providing secure digital services to their residents and how a strong identity posture allows you to build portals that improve the level of service to your communities. We highlighted successful implementation strategies featuring examples from state agencies and discussed how Okta and Active Cyber can assist. Topics included how to begin providing and informing governmen...
It's Time to Modernize Your Org Charts
Attendees learned how to embrace the future with Ingentis org.manager and they discovered the transformative power of automation. Ingentis org.manager provides a comprehensive solution for organizational design and people analytics. During this webinar, attendees learned about:Outdated drawing tools: ineffective for future-oriented organizationsUp-to-date charts without manual effortsUnlocking organizational insights with versatile chart creat...
Elevating Your A-123 Control Program wi...
On August 28th, 2024, attendees joined us for an insightful webinar where they learned new strategies for enhancing their A-123 internal control program. During the session, we explored the shift from reactive to proactive approaches, addressing the common challenges faced by agencies in managing their A-123 control programs. Through our demonstration of Workiva, attendees discovered: How our platform empowers agencies to streamline the end-to...
Firearm Violence Prevention: Community...
Community violence interrupters are an emerging evidence-based strategy for Community Violence Intervention (CVI) and firearm violence prevention. Interrupters have relationships with the community and work to intervene, mediate, and deescalate often retaliatory cycles of violence. They are an on-the-ground, trusted presence and can be invaluable in mitigating community violence. This webinar will explore strategies to engage interrupters in c...
The Importance of OSINT in Defense Operations
As we navigate increasingly complex global security challenges, harnessing OSINT has proven indispensable in enhancing situational awareness, intelligence gathering, and strategic decision-making. OSINT encompasses the collection and analysis of publicly available information from a variety of sources, including social media, news outlets, blogs, and government reports. Unlike classified intelligence, OSINT provides a broad, real-time perspect...
Meet the Presidential Cybersecurity Man...
Watch this on-demand webinar designed to empower federal agencies to achieve the cybersecurity goals outlined in the latest presidential mandate. Discover how RSA's newly FIDO2-certified authenticator app can transform your agency's security infrastructure. Learn how the RSA authenticator app can help federal and other government agencies defend and modernize key infrastructures, enhance and scale collaboration between public and private secto...
CTO Sessions: Cloud HSM Best Practices
Although federal agencies are deploying cloud solutions at a rapid pace, they are often hesitant to move their core cryptographic infrastructure to the cloud—namely their roots of trust. Hardware security modules (HSMs) are used as a root of trust and generate, store, protect, and manage cryptographic keys used to secure sensitive data and critical applications. HSMs are traditionally deployed on-premises but they can be safely deployed...
Tableau Enablement Series Part 8: Seize...
This session allowed attendees to learn how to quickly adapt their data to Accelerators and other Tableau templates in order to speed up the time to data-driven decisions and valuable outcomes. During this webinar, attendees learned more about:Adapting Data to AcceleratorsUtilizing Tableau TemplatesSpeeding Up Data-Driven DecisionsAvoiding Common PitfallsTroubleshooting Techniques
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.