269 webcasts found
+ 26 past events found
Back to Search Begin New Search Save Search Auto-Notify
Cyber Resilience 2023 - Two Day Virtual...
Ever since the dawn of the internet, its usefulness lies in the data it handles, whether moving it, storing it, or calculating with it. As a result, just as Willie Horton once said he robbed banks because “that’s where the money is,” many of today’s cyber bad actors target agencies’ data because they can monetize it. As a result, cybersecurity is akin to the 20th century Cold War. On the one hand, bad actors ...
Add Favorite
Time To Tableau
Tableau helps people see and understand data through visual analytics and enables more people in your enterprise to analyze data in an intuitive drag and drop interface. As the market-leading choice for modern business intelligence, the Tableau analytics platform makes it easier for people to explore and manage data, and faster to discover and share insights that can change businesses and the world. If your organization desires to provide self...
Add Favorite
Protect Your Government Agency's Data a...
Modernizing applications and migrating to public cloud platforms enhance agility and flexibility. But there are also trade-offs to consider, including new and borderless attack surfaces, lack of consistent visibility, and growing tool sprawl and tool expenses. Together, Gigamon and Sumo Logic enable organizations to build an effective and efficient monitoring and security posture that surfaces a level of understanding unattainable beforehand....
Add Favorite
Risk Intelligence: Proving Your Cyberse...
Cybercrime is evolving at the speed of innovation, sometimes outpacing the progress of cybersecurity. Cybercrime often has the advantage as it is highly motivated and not bound by the many required compliance and regulatory mandates that businesses face. Threat intelligence can be a useful ally, enriching the process of audit and assessment, and providing proof of security controls and policy enforcement that is required for security and comp...
Add Favorite
Build and Grow a GIS Program for Operat...
Where do you start when building a GIS program from scratch? Guadalupe-Blanco River Authority (GBRA), which provides stewardship for water resources in its ten-county district in south central Texas, invested in Esri ArcGIS Enterprise and field data collection applications at the start of their journey and added Nearmap to their tool set. Based on previous experience, GIS Administrator Mysti Downing knew Nearmap high-resolution imagery could p...
Add Favorite
Introduction to Alteryx
Please join us for our upcoming ‘Introduction to Alteryx’ webinar. Alteryx is a drag-and-drop, data prep and analytics platform that allows users of all types of backgrounds to easily connect to, manipulate and analyze their data. During this webinar, we will be introducing the basic data preparation and blending capabilities of Alteryx. Attend this Alteryx webinar and learn how to: Pull data in from any data source Join disparate...
Add Favorite
Tracking, Controlling, and Protecting U...
In this webinar, attendees will: Learn practical strategies to harness the value of unstructured data while remaining compliant and securing sensitive information Examine the latest techniques for cataloging, classifying, and applying governance policies to documents, emails, chats, and more Gain the knowledge and tools to master secure unstructured data management in these ever-changing environments of compliance and AI
Add Favorite
HPE & Qumulo Present Scale-Out File and...
Federal agencies are facing the new norm of managing data on-premises in addition to the increasing sprawl of data now emerging at the edge and in the cloud. Furthermore, the difficulty of managing data is compounded by challenges like remote teams or the advent of cloud services and businesses leveraging more of these due to increased agility and flexibility of options. Agencies then need to consider that data has gravity and must reside in...
Add Favorite
Transforming Authentication: From Execu...
The Executive Order M-22-09 mandates that all government agencies and contractors doing business with the government must implement phishing-resistant MFA for employees, contractors and citizens online applications by fiscal year end 2024. NIST, CISA, and NSA have recommended a FIDO-based approach as the best option. Together UberEther and Nok Nok provide the platform and expertise to address the executive order, and make it easy for you to ac...
Add Favorite
Carahsoft IACP Webinar 2023 Emerging Te...
Zebra and Carahsoft are excited to invite you to join us subsequent to IACP 2023 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Advancements in technologies have enabled police agencies to find innovative ways to leverage new technologies to increase effectiveness and improve officer safety. With the right pairing of mobility and data communication technologies...
Add Favorite
Back to Search Begin New Search