Back to Search Begin New Search Save Search Auto-Notify
The Future Belongs to Learners Series:...
Take your ChatGPT skills to the next level. In this session, participants learned how to use advanced tools - Deep Research, Projects, Data Analysis, Canvas, Connectors, and ChatGPT Agent - to move from simple prompting to structured, repeatable workflows. OpenAI demonstrated how these capabilities helped government teams collaborate, analyze data, and deliver results more efficiently while maintaining enterprise security and compliance.What P...
Add Favorite
Employing AI to Bring Order and Value t...
Key topics included:The challenges associated with traditional document management processes and technologyHow advanced technologies like Artificial Intelligence and Machine Learning bring time savings and order to high volume, multi-stage document processingTaking advantage of the resulting improved data to streamline business processes
Add Favorite
Building Your AI BD Program for 2026
ChatGPT has become a go-to tool for many in GovCon BD, but using it effectively — and safely — is another story. In this webinar, we’ll demonstrate practical ChatGPT use cases for business development, show how to reduce risks around compliance, accuracy, and security, and then compare those results against secure, purpose-built AI solutions designed specifically for GovCon. You’ll see side-by-side examples and walk awa...
Add Favorite
Hyland & AWS Digital Transformation Jou...
Digital transformation isn’t a one-size-fits-all leap — it’s a journey. Whether you’re exploring possibilities or looking to fully optimize your operations, Hyland & AWS's three-part webinar series will guide you through each stage of the process: Crawl. Walk. Run. Hyland & AWS experts hosted online sessions to break down practical steps, proven strategies and real-world examples to help your agency confidently...
Add Favorite
Archer Continuous Controls Monitoring
In this webinar, attendees explored:How Cypago connects and analyzes data to automate IT complianceThe role of Archer Continuous Controls Monitoring in reducing manual effortBest practices for integrating Archer and Cypago to enable continuous monitoringPractical use cases for streamlining audits and strengthening compliance posture
Add Favorite
Beyond MDBR: Why SLED Organizations are...
MS-ISAC’s free Protective DNS (MDBR) ended on October 1. With funding discontinued, the need to act is urgent. But this moment presents more than just a replacement decision; it’s an opportunity to upgrade this critical layer of cyber defense. Infoblox Threat Defense is the mature, best-in-class alternative, trusted by Federal and SLED organizations to deliver proactive, intelligent and resilient DNS-layer security. It ensures comp...
Add Favorite
Fortra's MFT Solution
What Attendees Learned:How to use ICAP with GoAnywhere to apply and enforce sensitivity labels created by Fortra’s Data Classification SuiteWays to monitor and block sensitive data from being sent to unauthorized destinationsHow integrated Clearswift content scanning detects and stops malware, viruses, and banned file types
Add Favorite
Transforming Defense Cybersecurity: Ins...
This webinar brings together Bob Skinner, USAF retired former Director of the Defense Information Systems Agency (DISA) and Commander of the Joint Force Headquarters Department of Defense Information Network and Keith Johnson, Director of Defense Solutions at AWS. Together, they will discuss the Zscaler Trusted Access Gateway (ZTAG) and its role in revolutionizing cyber security within defense environments. Highlights will include how Zscaler...
Add Favorite
Full Throttle, Firm Control: Build Your...
State and local leaders are under pressure to deliver modern services, fast—and agentic AI looks like the accelerant. But autonomy introduces new risks you’re not staffed or tooled to absorb: emergent behaviors, goal hijacking, privilege sprawl and cascading failures that evade traditional controls. This session introduced Forrester’s AEGIS (Agentic AI Enterprise Guardrails for Information Security) framework, a practical blu...
Add Favorite
Using Real-Time OSINT to Defend Against...
During this session, attendees:Learn how to aggregate, analyze, and act on open-source intelligence to detect threats earlier.Discover how to correlate cyber indicators with physical incidents for a unified risk picture.See real-world use cases of OSINT enhancing decision-making and operational readiness
Add Favorite
Back to Search Begin New Search