Back to Search Begin New Search Save Search Auto-Notify
Improving Government Experiences: 4 Way...
A recent study cites that, “difficulty finding information and clarity of communications are the primary drivers of customer burden". A similar study cites, "39% of SLG leaders grade their department’s ability to deliver excellent, equitable, and secure citizen services an 'A'”. Alleviating customer burden can be challenging. Join Granicus for a complimentary webinar to hear from a government experience expert about how antic...
Add Favorite
Operating with Continuous Compliance
Why is it important to move from reactive compliance to always compliant? Traditional approaches to ensuring standards compliance, including federal regulations like FIPS 140-2, FISMA and FedRAMP, involve slow, manual post-build security scanning as part of the authority-to-operate process. With different gates of approval, these processes catch compliance and security defects too late, creating rework and sacrificing operational agility. Prog...
Add Favorite
Introduction to Advanced Analytics with...
Join Alteryx for an interactive session on conducting end-to-end analysis. To start off, we will unpack how federal, state, and local agencies are utilizing data driven approaches to enhance their operations, including reconciliation, risk assessment, and data deduplication. After a brief introduction to the possibilities, you'll go hands-on and learn how to apply these techniques for yourself. You will learn how to bring in and merge differe...
Add Favorite
Leveraging Delinea Server PAM for Smart...
Smart cards provide an enhanced level of security for Linux computers when users log on to Active Directory domains. If you use a smart card to log on, authentication requires a valid and trusted root certificate or intermediate root certificate that can be validated by a known and trusted certification authority (CA). Because smart cards rely on a public-private key infrastructure (PKI) to sign and encrypt certificates and validate that the c...
Add Favorite
Showcasing the Power of a Unified Secur...
Join us on November 15th for this CrowdStrike webinar where we will take a deeper dive into the benefits LogScale can provide security experts.
Add Favorite
CTO Sessions: A Guide to BYOK and HYOK...
Cloud Security Alliance best practices require that keys be stored and managed outside of the cloud service provider and the associated encryption operations. Cloud Service Providers therefore offer Bring Your Own Key (BYOK) or Hold Your Own Key (HYOK) services to enable customer control of the keys used to encrypt their data. Customer control of the keys allows for the separation, creation, ownership and control, including revocation, of encr...
Add Favorite
Atlassian Team Tour: Government 2024
Atlassian is transforming government teamwork with tailored solutions to meet your agency's security and compliance needs. Enhance service delivery, responsiveness and mission success with insights from this year’s Team Tour: Government which was hosted on March 6, 2024 in Washington, D.C. Access all recordings on-demand, including keynotes and breakout sessions, and discover: Actionable tips to break down silos so your teams can increas...
Add Favorite
Back to Search Begin New Search