SANS Baltimore Spring 2024: Keynote - S...
In the field of cybersecurity, we are failing to acknowledge that we have a big problem. Our job titles and job descriptions have the word security in it even though security isn’t our job. I have never met a security professional who claims that their organization will never be breached. Yet, we call ourselves security? When a breach does occur, it reflects poorly on us. Did it mean we did our jobs poorly that day? Let’s have the...
What Tech Does Your Data Science Team N...
When it comes to data modeling and analysis, a professional data science workstation is a world away from the standard PC. Today’s data scientists need the latest technology to work faster and smarter to maximize the extraordinary potential of machine learning. Join Government Technology and HP for a live webinar exploring how to equip data science teams with the technology they need to accelerate data analytics and machine learning. You...
Prevent Cloud Incidents from Becoming C...
The number of cloud security breaches in the headlines have been staggering lately. It seems like a week cannot go by without a massive amount of sensitive data being leaked from either AWS, Azure, or Google Cloud. One example that would be funny if it were not so sad is the September 2023 incident where the Microsoft AI team leaked 38TB of sensitive data, including employee workstation backups and 30,000 internal Teams messages, due to a misc...
IT Service Excellence in the Public Sector
From adopting ITIL to embracing automation, learn how IT leaders in the public sector are improving IT Service Desk outcomes. Join for a discussion with Abigail Ferguson, Customer Success Manager for Madison, Wisconsin, and Jon Rike, CIO for Dayton, Ohio, as they share their journeys. A recent national survey conducted by the Center for Digital Government (CDG) among state and local government IT professionals revealed that only 38% of respond...
Creating Content that Captivates (and A...
In today's digital landscape, content marketing is crucial to establish trust, credibility and build relationships with state and local government and education (SLED) decision-makers. Join our team of seasoned content experts to get actionable insight on how to leverage content marketing to reach public-sector buyers faster and more efficiently at our LIVE webcast on May 1 at 9 AM Pacific/12 PM Eastern. One of the most common challenges of co...
AWS Contact Center Day
Are you ready to transform customer experience? Join our free virtual conference where you'll learn how to harness the power of generative AI to streamline your operations, improve customer service, and increase employee happiness. Hear from industry experts, AWS customers, and partners about the latest trends in CX transformation. With sessions focused on an innovative business journey and exploring top CX use cases, learn how organizations o...
Defending the Human Layer in the Public...
Human error has long been the preferred weak spot for cybercriminals to attack. As the threat landscape evolves, attacks increase in sophistication, and the attack surface expands, organizations should shift their focus to empowering and securing workforce identities. This will help in addressing immediate risks and foster a proactive culture of security awareness and resilience. These weak spots may come from an unaware employee falling victi...
Coffee Break Series: SLED Research Brew...
Episode 4: "Harnessing Research for Strategic Account Planning & Account-Based Marketing" Our "Coffee Break Series: SLED Research Brew," is designed for professionals navigating state, local and education (SLED) sales and marketing. Each episode serves up a fresh cup of insights and strategies, all before you are finished with your morning coffee. Our experts will dive into the latest products, tools and methodologies that are shaping the...
The Achilles Systems Hack Assessment Se...
Achilles Systems, a fictitious IT service provider to human resources teams in medium and large businesses, has fallen victim to an attack in which sensitive customer data and, potentially, customer networks, have been compromised. Achilles has a small security team who has historically focused on basic controls and compliance. However, it seems clear this attack was the work of a sophisticated adversary capable of circumventing the controls i...
AUSA's Noon Report - GEN (Ret.) David H...
AUSA’s Noon Report webinar series features presentations by senior Army leaders responsible for key programs and initiatives, as well as contemporary military authors who weave together the past, present and future story of the United States Army. AUSA’s Noon Report Webinar series invites you to join us on Tuesday, 16 April 2024, at 12:00 EST to hear a presentation by GEN David Petraeus, U.S. Army, Retired, who co-authored Conflict...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.