Back to Search Begin New Search Save Search Auto-Notify
Sea-Air-Space 2024 Webinar Series: Fort...
Thank you for your interest in our Sea-Air-Space 2024 Webinar Series, Ivanti Session: Fortifying DoD Networks with CAASM & Patch Management Attendees of this webinar learned how Ivanti can help your organization: Implement a risk-based approach for vulnerability prioritization and patching in DoD and Federal networks Incorporate vulnerability management processes through automation Enable better collaboration between IT and security stakeh...
Add Favorite
UEM Innovation Update: How BlackBerry H...
This webinar discussed BlackBerry's updates to their UEM platform and key differentiators. Attendees learned about BlackBerry's upgrades to the UEM platform including: Enhanced Security for Multiple Deployment Models (COPE, BYOD, etc.) Increased Productivity / UX for Daily Tasks with Microsoft Intune Integration Real-Time Mobile Threat Defense for All Secured Applications Greater Value than Ever Before, with BlackBerry UEM Suite
Add Favorite
Revolutionizing Land Development Applic...
Explore the Region of Halton's shift from traditional paper and PDF dropboxes to a cutting-edge, digital-first approach to managing development applications! This transformation was made possible through the adoption of Salesforce Public Sector Solutions in partnership with Salesforce Consulting Partner, MuniPaaS. In this on-demand recording, you will discover: Digital Strategy: Explore the region of Halton's commitment to a digital-first, cu...
Add Favorite
Seizing the Right Evidence, Anywhere
State and Local law enforcement officers often encounter unique challenges when collecting digital evidence. This webinar focuses on navigating unconventional crime scenes, from **inside a suspect's home** to remote locations like woods or parking lots. Access the on-demand recording to join ADF as they delve into critical considerations for State and Local agencies. Specifically, you will learn how to: Effectively secure digital evidence in d...
Add Favorite
SecureWorld Healthcare
Don't miss the SecureWorld Healthcare virtual conference on May 1, 2024, to connect and learn with other cybersecurity professionals in your field! The agenda offers 12 educational sessions and 5 CPE credits.
Add Favorite
From CloudChaos to CloudClarity
Are you ready to revolutionize your cloud management? This webinar features IBM's Apptio Cloudability & Turbonomic solutions - the industry leading duo for optimizing your cloud operations and cost. During the webinar, attendees learned key aspects of FinOps execution and optimization including how to: Gain Visibility: Understand who is consuming cloud resources and the associated costs across all major private clouds and public clouds Sla...
Add Favorite
AO Perspectives: Managing Risks and Str...
Picture this: you're on the brink of securing that crucial ATO approval, but the path is fraught with pitfalls—complex regulations, potential human errors, and the constant specter of cyber threats lurking in the shadows. As an Authorized Official (AO), you're all too familiar with the uphill battle of navigating the complexities and risks of the ATO package approval process while maintaining the resilience of your organization's defense...
Add Favorite
Quantum Readiness: Effective Strategies...
Quantum Computers pose an existential threat to data encryption. In addition, adversaries are already capturing sensitive network traffic for Store Now, Decrypt Later (SNDL) attacks. For this reason, the Quantum Computing Cybersecurity Preparedness Act (H.R. 7535) requires federal agencies to prepare now to protect National Security Systems. Specifically, government agencies must maintain an inventory of all information technology in use that...
Add Favorite
We Know Your Passwords (Do You?) - Free...
This on-demand webinar exposed: Shocking statistics: We dived deep into the data on password breaches and cyberattacks, revealing the true scope of the problem. Current Threats: Learned about the latest hacking techniques cybercriminals are using to bypass weak passwords and gain access to your systems. The Urgency for Change: Discovered why traditional password-based authentication is no longer enough to keep your data safe. The Solution: Ex...
Add Favorite
Connecting the Unexpected: Scalable Dat...
Thank you for your interest in our Certus Group webinar! During this webinar, attendees learned: How Knowledge Graphs provide a scalable solution for your data structure needs The application of large language models to knowledge graph solutions The diverse use cases supported by Certus Core’s Semantic Knowledge Graph solution The importance of data governance and data standardization in scalability
Add Favorite
Back to Search Begin New Search