Operationalizing Empathy in Healthcare:...
AWS, Qualtrics, and Carahsoft hosted a healthcare webinar on March 13, 2025. This webinar was designed for healthcare providers, program managers, and organizational leaders interested in integrating empathy and data-driven insights into their operational framework.Attendees of this webinar discovered:How data analytics can help healthcare organizations gather patient and employee feedback to uncover what matters most and act quickly to create...
Navigating the Shift to Post-Quantum En...
As quantum computing advances, federal agencies must proactively transition to quantum-resistant encryption to safeguard sensitive data and meet evolving compliance requirements. This webinar explored how agencies can navigate this critical transformation with confidence. Topics covered in this webinar included:Provide an in-depth look at the key challenges, regulatory mandates and structured approaches necessary for a smooth transitionHighlig...
Do You Trust Me? The Basis of ZTA Archi...
In this webinar experts from Commvault and ATP Gov explored integrating security into every aspect of the information architecture, aligning with NIST’s Cybersecurity Framework. Despite the extended deadline to 2027, agencies must leverage AI, automation, and advanced strategies to fortify their zero-trust frameworks. Further, they discussed the concept of cyber resilience and its crucial relationship to ZTA, ensuring a comprehensive and...
AI Agents for OSINT, Fraud, and Threat...
Thank you for your interest in our Overwatch Data webinar: AI Agents for OSINT, Fraud, and Threat Intelligence! In today’s rapidly evolving threat landscape, manually monitoring OSINT and illicit spaces across social, deep, and dark web sources leaves organizations vulnerable to missed threats. Watch Overwatch Data's webinar that explores how AI agents can automate cyber and fraud threat intelligence - prioritizing risks, delivering acti...
Wireless Air Defense: It's Not Just Wi-Fi
As wireless technology becomes more integrated into everyday business operations, it’s essential to understand the risks it introduces and how these vulnerabilities can compromise sensitive data and systems. This event will provide valuable information and practical strategies that can help you safeguard your organization against these threats. In this webinar we discussed: Understand the growing risks posed by wireless vulnerabilities.H...
Modernizing Government Finance with Pal...
Attendees learned how government agencies modernized financial operations with AI, automation, and data-driven insights to adapt to shifting policy priorities. They explored how Palantir Foundry and Palantir AIP empowered agencies to unify financial data, optimize budgeting, improve audit readiness, and enhance contract management. Through the session, attendees gained insights into advanced financial analytics that drove efficiency and smarte...
Managing DoT Data for Optimized Service...
As state and large city Departments of Transportation (DOTs) continue to maximize the value of their institutional data, advances in data management, including machine learning and artificial intelligence, offer new opportunities to leverage this data to improve safety and better serve constituents. A secure, flexible and open data architecture – one that can leverage cloud and on-premise resources, as well as existing investments ...
Achieving Zero Trust Data Security with...
As cyber threats continue to evolve, federal agencies must adopt a Zero Trust approach to data security. View Trellix's exclusive webinar where we explored how our Data Security solutions help strengthen security posture, ensure compliance and protect mission-critical data from insider threats and external attacks. What Attendees Learned:The fundamentals of Zero Trust Data Security and why it’s critical for modern organizationStrategies...
Fortifying the Future: Protecting 3rd a...
As supply chains become increasingly digital and interconnected, cybersecurity risks from partners and suppliers are evolving at an alarming pace. Cyberattacks targeting 3rd and 4th party supply chain networks—ransomware, data breaches, and third-party vulnerabilities—can have devastating consequences on your company. With more Governments looking to increase regulations to ensure organisations secure 3rd and 4th party providers, o...
Flexible Grants Management in an Era of...
As the grants landscape continues to evolve, agencies need to strengthen their existing proactive approach with proven strategies for future success. Watch our on-demand webinar to discover practical techniques for building data collection systems that capture both current requirements and anticipate future needs. Dive deep into sophisticated impact measurement techniques that powerfully demonstrate your program's value to stakeholders and str...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.