Back to Search Begin New Search Save Search Auto-Notify
Enhancing Homeland Security Operations...
In today's fast-paced digital environment, the Department of Homeland Security (DHS) faces complex challenges in maintaining robust IT operations and ensuring the security of critical infrastructure. This webinar included the transformative potential of Splunk IT Service Intelligence (ITSI) to streamline and enhance IT operations within DHS. Participants joined us as we explored how Splunk ITSI’s advanced analytics, machine learning capa...
Add Favorite
From Compliance to Leadership: How CMMC...
On October 10th, our distinguished panel explored how organizations can leverage CMMC (Cybersecurity Maturity Model Certification) not only to meet compliance requirements but to elevate their long-term security leadership. By gathering insights from top experts across industries, the panel demonstrated how CMMC acts as a catalyst for building a more mature and resilient security posture, enabling businesses to lead confidently in the face of...
Add Favorite
Insider Risk Programs: Three Truths and a Lie
In this webinar, Everfox Director of Enterprise User and Data Protection, Michael Crouse, shares insights on why insider risk management is not about cyber controls and checklists that only show what occurred without indicating why. Insider risk sits at the junction of organizational and technical controls where an insider risk management plan must address the needs of the program before, during and after critical events, not just during incid...
Add Favorite
Preparing for Your Crypto Future: Marke...
From the Pentagon to boots-on-ground, cloud computing is driving actionable, data driven decisions that keep our nation safe. Effective data analytics require edge to cloud data collection as well as cloud to edge data dissemination. The secure transport of this data over disparate networks is driving interdependencies between data links over secure Layer 3 using High Assurance IP Encryption (HAIPE) and secure Layer 2 using Ethernet Data Encry...
Add Favorite
Navigating the Complexities of Multimed...
The growing volume of digital evidence, like CEM and CSAM, can make identifying and preserving crucial information overwhelming. Our upcoming webinar will provide strategies to streamline your workflow and leverage advanced tools like filters and quick video frame previews to speed up evidence review and improve accuracy. Access this on-demand webinar recording to learn how cutting-edge digital forensics can transform your investigative proces...
Add Favorite
Leveraging Digital Data to Enhance Pris...
During this webinar, Cellebrite experts Lee Papathanasiou and Matt Goeckel dove into innovative strategies and technologies used to combat criminal activities within correctional facilities. This webinar highlighted the importance of digital intelligence in identifying and mitigating threats posed by contraband devices, ensuring the safety of both inmates and staff. Attendees gained insights into the latest tools and methodologies for collecti...
Add Favorite
Optimizing Naval Logistics and Readiness
During this session, our expert speakers dove into how Salesforce’s powerful technologies, including Tableau, Mulesoft, and Slack, integrated with AWS’s robust cloud infrastructure, are reshaping naval operations.Attendess learned:Innovative Solutions: How these technologies enhance operational efficiency, asset management, and readiness planning.Practical Use Cases: Real-world examples of seamless data integration, real-time analy...
Add Favorite
Capturing E-Rate Pilot Dollars For Your...
Student safety is a top priority, especially as cybersecurity challenges continue to grow in the educational environment. The problem we face today is how to effectively leverage AI to enhance security while improving efficiency and reducing employee burnout with limited staff.How can we ensure that our cybersecurity teams are equipped with the tools they need, despite resource constraints?During this complimentary webinar, attendees learned:H...
Add Favorite
AI for the Rest of Government Part One:...
This webinar identified and explored current concerns regarding the adoption of AI in government agencies. Attendees created a foundational understanding of how to utilize AI within their agency.This session explored:How agencies can prepare to take advantage of AI.How to quickly and easily organize digital messes at scale.How agencies can best communicate with employees about AI.Register now to start your journey in understanding and utilizin...
Add Favorite
Dynatrace Lunch Bytes Webinar Series
Instead of settling for a regular break, participants joined Dynatrace online for Lunch Bytes, a snackable series of easily digestible events covering today's leading technology topics. Participants upgraded their lunch time with Public Sector Solutions Engineer, Matt Gardner, as he shared tactical insights and practical use cases on the following topics across three 30-minute sessions.CI/CD Secrets: Dynatrace & Red Hat OpenShiftEnhance th...
Add Favorite
Back to Search Begin New Search