Back to Search Begin New Search Save Search Auto-Notify
Level Up Your Dashboards with Viz Extensions
This exciting webinar explored how Tableau Viz Extensions can take your dashboards from great to game changing. Attendees learned how to enhance interactivity, embed custom visuals and extend the functionality of dashboards beyond out-of-the-box capabilities. We showcased real examples, shared practical use cases and highlighted the tools and techniques needed to get started with extensions—no code required. During this webinar, attendee...
Add Favorite
Using AI to Detect Foreign Influence Ri...
The risk of foreign influence – either by nation state actors or individuals with connections to them – is real and growing more significant all the time. At the same time, foreign investment can play an important role in maintaining the vitality of the U.S. industrial base. Against this backdrop, it is essential that federal agencies and the mission partners that support them are acutely aware of their risk of nefarious foreign in...
Add Favorite
CMMC and GCC High: The Roadmap to Compliance
The CMMC Final Rule (CFR 32) took effect on December 16, 2024, and CMMC assessments commenced on January 2, 2025. CMMC is set to enter into contracts (CFR 48) in mid-2025. As deadlines approach and the threat landscape continues to evolve, public sector organizations are rushing to comply with CMMC requirements while also evaluating if transitioning to GCC High is essential. Watch the on-demand webinar on achieving CMMC compliance with Microso...
Add Favorite
BMC Helix and Flexera Better Together:...
In today’s complex IT environments, organizations face mounting pressure to reduce software costs, ensure compliance, and streamline service delivery. Watch this on-demand webinar that explored how the integration of BMC Helix and Flexera empowers IT teams with a unified view of assets, real-time intelligence, and automated workflows. Discover how this powerful partnership bridges the gap, enabling smarter and faster decisions across you...
Add Favorite
Design Like a Pro with Layout Basics
Clear, accessible, and well-designed documents are key to effective government communication. Adobe InDesign helps improve the quality and consistency of materials like reports, brochures, and digital content. Watch our on-demand webinar for an introduction to Adobe InDesign, the industry-standard tool for layout and publishing powered by Adobe Firefly artificial intelligence. Specifically, this webinar showed attendees how to:Set up your docu...
Add Favorite
How Booz Allen Leveraged Deltek and RPA...
In this insightful webinar, attendees explored how Booz Allen, a large, advanced technology company, combined its vision with Deltek Costpoint, the power of UiPath's RPA, and Baker Tilly's expertise to deliver measurable improvements and efficiencies in customer billing operations. Participants discovered how Booz Allen partnered to apply best-in-class innovation and technology to reduce billing days, improve cash flow, and lower costs. The se...
Add Favorite
Secure, Streamlined Virtualization for...
Red Hat hosted an exclusive virtual event on August 26th for federal civilian agencies to explore how Red Hat OpenShift Virtualization accelerated deployments, streamlined IT operations, and enabled smarter, more secure solutions. Attendees connected with Red Hat experts to learn how our cutting-edge technology helped agencies:Accelerate Deployments: Streamline virtual machine provisioning and management on OpenShift, enabling faster applicati...
Add Favorite
Securing the Future: AI-Powered Office...
Whether you're leading cybersecurity efforts, managing IT systems, or shaping compliance protocols, this webinar delivered practical strategies you can implement right away. This webinar covered: How to secure and retain multi-channel communications across devices.Using AI to detect and stop real-time communication threats.Meeting compliance requirements with flexible, user-friendly tools.
Add Favorite
Cyber Protection and Access in Conteste...
CSOI Zero Trust Networking alignment redefines how secure access and protection are controlled over various communication channels across contested and diverse IT, OT and cloud environments. By shifting focus from securing the network perimeter and away from using end-user credentials as primary network authentication to policy-based access centered around cryptographic identities, CSOI delivers a powerful identity-based, non-kinetic advantage...
Add Favorite
CimTrak Enabling Comply-2-Connect and C...
As federal agencies accelerate their Zero Trust adoption, ensuring system integrity and compliance with mandates like Zero Trust and Comply-to-Connect (C2C) is more critical than ever. During this webinar, experts from Zscaler and CimTrak explored how combining Zscaler’s cloud-native Zero Trust Exchange with CimTrak’s real-time integrity monitoring and configuration management capabilities creates a robust framework for visibility,...
Add Favorite
Back to Search Begin New Search