Value Streams in Action: How to Configu...
In our previous webinars with Adaptivist, we introduced the concept of Value Streams and then looked at a live demo of a Value Stream in Action. Now, let's look at how you can configure your first Value Stream with Atlassian tooling. On March 4th experts explained: Tool configuration to collaborate effectively across teamsHow to keep stakeholders informed and engagedWays to adapt your tools to meet the unique needs of your agency
iboss Beyond Web Filtering
Carahsoft, Howard and iboss had an exclusive webinar tailored to K-12 IT Directors where attendees learned how iboss' Zero Trust SASE platform is transforming cybersecurity in schools. Webinar Highlights:Real-world examples of how iboss is helping schools stay ahead of cybersecurity threatsInsights into the latest trends in K-12 education cybersecurityLive Q&A session with experts from Howard and iboss
Cost Allocations for State and Federal...
How does your agency calculate its costs? Is your agency government-funded, or do you calculate the price of a service cost to charge to the public? Watch this on-demand webinar to understand how state and federal agencies use cost allocation software to understand their costs and manage their budgets with ease. Whether you are a seasoned financial manager or just starting out in IT, finance or operations, this webinar will help you understand...
Mastering 508 Compliance: Ensure Access...
Are your PDFs truly accessible? Ensuring compliance with Section 508 is essential for creating user-friendly digital documents, but achieving it can be challenging without the right tools. Whether you’re responsible for document remediation or just getting started with usability, this session will provide practical insights to help you streamline your workflow and meet regulatory standards with confidence. Discover Adobe Acrobat’s...
Streamline your SailPoint IdentityIQ de...
Instrumental Identity's SailPoint IdentityIQ DevOps solution is designed to streamline your IdentityIQ deployments by integrating a comprehensive suite of tools and practices. Watch the on-demand recording to learn more about key attributes, including depreciation checks which help identify outdated or unsupported code. Automated testing ensures that your code is thoroughly tested and validated, reducing the risk of bugs and improving overall...
How CIOs Can Leverage CFO Strengths to...
Chief finance officers (CFOs) have always held a power seat at the C-suite table. However, a recent Gartner study shows just how deep their influence runs within the ranks and how CFOs have achieved this status. Join this complimentary Gartner executive leadership webinar as a Gartner expert uncovers the strengths of leading CFOs and how chief information officers (CIOs) can leverage them to boost their own C-suite impact. You will walk away f...
How to Drive Action and WOW Stakeholder...
This webinar explored strategies for transforming your Tableau visualizations from static displays into actionable, stakeholder-friendly dashboards. Learn how thoughtful design principles and dynamic interactivity can drive decision-making, create engagement, and leave a lasting impression on your audience. If you’re ready to turn your data into a visual storytelling powerhouse, this webinar is for you. During this webinar, attendees:Mas...
Mastering IT Automation for Seamless Op...
Automation is the key to reducing complexity, boosting efficiency and driving innovation across your IT environment. PureLogic and Red Hat hosted an insightful session to explore how Red Hat can help Canadian teams scale automation and solve today’s operational challenges. Red Hat Ansible Automation Platform offers a transformative solution to the inefficiencies in task execution, data management and workflow coordination that can delay...
F5 Capture the Flag
The F5 DISA team hosted an interactive Capture the Flag competition where attendees competed against others to hunt for API vulnerabilities and learn how they work. In this lab and Capture the Flag exercise, attendees learned how to identify and mitigate:Hard-Coded Secrets: Many applications exchange user credentials for a hard-coded token or key. This key allows anyone who knows it to gain access to the application; however, many times, these...
Strengthening DoD Cyber Resilience
In the rapidly evolving threat landscape, the Department of Defense faced unprecedented challenges in maintaining robust cybersecurity across its vast digital infrastructure. This workshop brought together two leading solutions in cyber defense, Armis and AttackIQ, to offer a comprehensive approach to strengthening your organization's security posture. Armis Overview Discovering and managing an accurate, unified and continuous asset inventory...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.