How to Hunt for Volt Typhoon Malware in...
The federal government has strenuously and repeatedly stated that critical infrastructure providers must be proactive in hunting for malware that may be present in networks, focusing specifically on CCP-sponsored Volt Typhoon Adversary. Attendees joined critical infrastructure experts for a panel discussion on how to hunt for Volt Typhoon. Discussion topics included:How Four18 Intelligence uses UnknownCyber ThreatHunter to hunt for Volt Typhoo...
No Room for Doubt: Mastering the Cyber...
Unexpected downtime from a cyberattack can be costly for your customers. From lost productivity, reputation or data, having critical systems go down can cause serious damage, especially if there is not a recovery plan in place. Your customers need security and confidence in the recovery, leaving no room for doubt that their systems have clear plans in place to mitigate risk and impacts of cyberattacks.Join Veritas and Carahsoft for an extensiv...
Cyber Lakehouse for the AI Era, ZTA and...
Many agencies today are struggling not only with managing the scale and complexity of cyber data but also with extracting actionable insights from that data. With new data retention regulations, such as M-21-31, compounding this problem further, agencies need a next-generation solution to address these challenges. Attendees of this webinar explored how organizations can build their next-generation cyber lakehouse. They looked at how agencies c...
Navigating AI Data Complexity with Sand...
Everyone says they’re already doing AI, so why do your teams keep getting stuck on the AI data starting block? Getting data ready for AI is hard; according to Gartner, only 4% of companies say their data is AI-ready. Attendees learned how Sandia National Labs ran into this challenge when building AI for the TSA, and how they overcame it. Not interested in reinventing the wheel, Sandia instead became laser focused on breaking new ground f...
UiPath Test Suite Webinar
Complying with stringent regulatory requirements, properly masking citizen data, operating with limited resources and budget—these are just a few of the challenges that organizations in the public sector must overcome when testing applications. With UiPath Test Suite, you're equipped with production-grade, AI-powered test automation capabilities that enable you to test all your applications—both modern and legacy—so that you...
Unlocking the Potential of AI & Data Sc...
The US government has initiated various AI/ML programs, emphasizing the strategic importance of customer experience (CX), including AI Legislation and Executive Orders (EO) like EO 14058. The impact of AI resonates across multiple crucial government sectors, from National Security and Health & Human Services to Commerce, Energy, Law Enforcement, Public Authority/Utility and Transportation. The adoption of AI doesn't come without challenges...
Three Essential Steps to Unlocking Pote...
Stream AvePoint Public Sector's webinar to learn how to effectively prepare, secure, and optimize your data for the upcoming availability of Copilot in the GCC for state and local government organizations. The workshop will cover three key steps: Preparing Your Data for Copilot:Understand the relationship between Microsoft 365 content and Copilot. Improve your content's quality and relevance for effective Copilot recommendations. Securing Your...
Mastering SPL with AI: Introducing the...
This webinar explored the transformative features of the Splunk AI Assistant, a generative AI-powered app designed to make SPL more accessible within the Splunk platform. This session showcased how the app facilitates the learning of SPL through natural language prompts and simplifies complex SPL commands into understandable segments. During this webinar, participants:Discovered how to use natural language prompts to generate SPL commands, mak...
Staying Ahead in the Evolving Landscape...
Attendees joined us for a webinar designed to help government agencies navigate CJIS compliance and explore the latest security measures. Attendees gained insights from real-world case studies, including the City of Garland and the City of Northport, showcasing the practical implementation of TecMFA and Tectango for Police. They also discovered how these solutions streamline operations, improve data security, and contribute to CJIS compliance....
CTO Sessions: How-to Guide for Enhancin...
Sensitive data stored in HPE deployments must be encrypted edge-to-cloud. For encryption to successfully secure sensitive data, the cryptographic keys used to encrypt/decrypt data must be secured, managed and controlled by the data owner. Thales TCT’s CipherTrust Data Security Platform unifies data encryption and unprecedented granular access controls with centralized key management—all on a single platform. This results in fewer r...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.