Back to Search Begin New Search Save Search Auto-Notify
Using Alteryx to Accelerate Workday Stu...
Data conversion is vital to the successful deployment of Workday Student, yet it is often one of the biggest sources of project churn. Most higher education institutions have legacy data in a variety of unique sources and formats, and much of that data will need to be imported to Workday-specific templates that often require complex, non-traditional manipulation and formatting to be loaded into Workday. Attendees joined this session, hosted by...
Add Favorite
Navigating the Zero Trust Maze
The federal government’s emphasis on cybersecurity for all agencies has had a dizzying effect on the regulatory environment. Agencies must address Executive Order 14028, mandating a zero trust architecture by September 2024. To get there, they must navigate through the General Services Administration’s approved cloud offerings in the Federal Risk And Management Program (FedRAMP). Then there are the National Institute of Standards a...
Add Favorite
Section 508 Compliance: Innovative Stra...
In the digital era, Section 508 compliance is not only a regulatory necessity but a positive commitment. For federal agencies and government institutions, upholding the highest standards of web accessibility is key. Join Equally AI in this informative session as they dive into Section 508 compliance and discuss how their ChatGPT-powered product can enhance the digital experience you provide to the public. Introducing Flowy, a revolutionary pr...
Add Favorite
CX Reimagined: How SMS Fosters Citizen...
Digitizing government services provides a unique opportunity to engage and serve the public. Prioritizing multi-channel outreach strategies has helped agencies to better engage with their vast audiences and underserved communities. Building an inclusive, transparent government starts with strategic communications that reach people where they are most. Governments benefit from creating thoughtful interactions that provide updates to enhance the...
Add Favorite
Cloud Success for Higher Ed Institution...
You and your Higher Ed team are invited for a webinar: Cloud Success for Higher Ed Institutions with HashiCorp Vault. On October 18th, Higher Ed institution professionals and industry experts host a webinar to discuss how HashiCorp Vault can update your cloud operating model and deliver new value to your students and faculty. Register now for insights on: Accelerating transitions: Education institutions must accelerate transitions to the cloud...
Add Favorite
Data Governance: Best Practices for Get...
Your one-stop-shop for a better understanding of data governance is here. Join Bobbi Caggianelli,Manager, Sales Engineering, at Collibra, as she outlines the need for data governance, how you can get started, and shares her first-hand experiences building a data governance program from scratch at a leading financial organization. Attendees of this webinar will learn: The need for Data Governance Where to start Culture change Collibra accelerat...
Add Favorite
Brand Protection and Enhanced Email Sec...
Anyone involved in email security today is likely familiar with the Domain-based Message Authentication Reporting and Conformance (DMARC) standard and its role in helping to secure email from threats like spam, phishing and email spoofing. But what is DMARC exactly, and how does it add another layer of security to business email systems? Register now to join Brad Allen, Sales Engineer at Mimecast, to learn: How to gain insight and control ove...
Add Favorite
Elevate Your Data: Navigating the World...
As organizations share data both internally and externally, embedded analytics can make visualizations easy to share and understand. In an era where data reigns supreme, the ability to transform raw information into actionable insights is paramount. Embedded analytics has emerged as a game-changer, offering organizations the power to seamlessly integrate analytics into their applications and decision-making processes. During this webinar, atte...
Add Favorite
Mastering Cloud Security with Prisma Cloud
In today's digital landscape, security is essential for resource and application deployments. Whether it's in private data centers or the public cloud, the complexity of cloud-native environments presents unique challenges. Rapid developer movements, fully automated workflows, and segmented security teams can lead agencies to deploy applications on cloud-provisioned resources without adhering to proper security protocols. This oversight can re...
Add Favorite
CTO Sessions Fireside Chat: Edge-to-Clo...
The rise of cyber attacks signals the current approach to security isn’t working, and the industry must make a radical shift to ensure protection of its most important asset – data. Enter Zero Trust. A defined roadmap and lack of cohesive security solutions places the burden of technology integration and partner orchestration on the customer. This results in organizations implementing a self-defined approach made up of an assortme...
Add Favorite
Back to Search Begin New Search