Back to Search Begin New Search Save Search Auto-Notify
Insider Risk Programs: Three Truths and a Lie
In this webinar, Everfox Director of Enterprise User and Data Protection, Michael Crouse, shares insights on why insider risk management is not about cyber controls and checklists that only show what occurred without indicating why. Insider risk sits at the junction of organizational and technical controls where an insider risk management plan must address the needs of the program before, during and after critical events, not just during incid...
Add Favorite
Preparing for Your Crypto Future: Marke...
From the Pentagon to boots-on-ground, cloud computing is driving actionable, data driven decisions that keep our nation safe. Effective data analytics require edge to cloud data collection as well as cloud to edge data dissemination. The secure transport of this data over disparate networks is driving interdependencies between data links over secure Layer 3 using High Assurance IP Encryption (HAIPE) and secure Layer 2 using Ethernet Data Encry...
Add Favorite
Navigating the Complexities of Multimed...
The growing volume of digital evidence, like CEM and CSAM, can make identifying and preserving crucial information overwhelming. Our upcoming webinar will provide strategies to streamline your workflow and leverage advanced tools like filters and quick video frame previews to speed up evidence review and improve accuracy. Access this on-demand webinar recording to learn how cutting-edge digital forensics can transform your investigative proces...
Add Favorite
Leveraging Digital Data to Enhance Pris...
During this webinar, Cellebrite experts Lee Papathanasiou and Matt Goeckel dove into innovative strategies and technologies used to combat criminal activities within correctional facilities. This webinar highlighted the importance of digital intelligence in identifying and mitigating threats posed by contraband devices, ensuring the safety of both inmates and staff. Attendees gained insights into the latest tools and methodologies for collecti...
Add Favorite
Protecting Modern Applications and Secu...
Government departments and agencies are increasingly turning to modern applications to improve their communications with and responsiveness to the public. Government records and data that were previously isolated and difficult for the public to access are now becoming widely available through APIs. While the data being made public through APIs is not the concern, the increased threat vector is.Securing modern API based applications in such an...
Add Favorite
Rhode Island Government Tableau Cloud ...
This was the first of many upcoming Tableau education sessions designed for all levels of government employees—from analysts to executives—and provided valuable insights for business, data, and analytics leaders, as well as other technical roles. Attendees discovered how to leverage Tableau Cloud and AI for personalized, contextual data insights. Whether they were new to Tableau, experts, or looking to harness AI-powered insights,...
Add Favorite
Stay Compliant with the CJIS Security Policy
The FBI Criminal Justice Information Services (CJIS) Security Policy sets the baseline security standards that both criminal justice and noncriminal justice agencies must adhere to in order to access and safeguard criminal justice information. The clock is ticking to meet these CJIS compliance standards! Failing to comply can lead to serious consequences, including legal penalties, data loss, and reputational damage.CyberArk, the global leader...
Add Favorite
Modern Intelligence with Connected Data...
Conventional tools used in data visualization often struggle to adequately retrieve and present the intricacies of large, connected data. These tools might not effectively illustrate how complex relationships and dependencies change over time. During this webinar, the MarkLogic/Progress team took a deep dive into how to explore your complex data in a visual, interactive and comprehensive way with applications custom built for advanced decision...
Add Favorite
Babel Street DoDIIS Webinar Series 2024
Modern supply chains face a growing array of threats, from adversarial disruptions to contested logistics, creating vulnerabilities that can impact national security and economic stability. Traditional intelligence gathering methods often struggle to keep pace with the dynamic nature of these risks. Defense and intelligence organizations need extensive data access to proactively address supply chain challenges, and OSINT offers valuable insigh...
Add Favorite
Three Ways to Build Cyber Resilience Be...
How confident are you that you can detect external threats to your government organization? Cybersecurity teams are investing significant time and resources into internal monitoring, while making use of public data. With proliferating external factors to consider and an ever-increasing number of digital assets to monitor, it is becoming increasingly difficult to achieve continuous threat detection in a single environment.During this webinar, T...
Add Favorite
Back to Search Begin New Search