Back to Search Begin New Search Save Search Auto-Notify
Ensuring Compliance Excellence: Unravel...
Adapting to evolving learning and development needs is a common challenge faced by many organizations, especially when transitioning from traditional in-person training to a modern virtual environment. This shift requires strategic planning and effective implementation to ensure a seamless and successful transformation.A prime example of successful adaptation is Amanda Brueschke's journey at Texas Manufactured Housing. Leveraging Adobe's rich...
Add Favorite
Tableau Enablement Series Part 3: Build...
Attendees of this webinar learned the art of creating inclusive data visualizations. Attendees were able to uncover key principles for designing dashboards that cater to diverse user needs, fostering an environment where everyone can derive valuable insights. During this webinar, attendees learned: Essential principles for designing inclusive dashboards Strategies to enhance usability for diverse user groups How to unlock the full potential of...
Add Favorite
How to Satisfy the New 2024 Email Authe...
Google and Yahoo are shifting long-standing best practices around authentication, encryption, and anti-spam into requirements for emails to be delivered to the inbox. A percentage of messages that do not meet these requirements are already getting temporary errors. In this on-demand webinar, we covered: New Google / Yahoo Requirements PCI 4.0 Compliance and DMARC Business Email Compromise What’s Next? - The future of email security Why E...
Add Favorite
Deciphering CMMC 2.0 Timelines & Milestones
During this webinar, we covered the latest CMMC 2.0 timelines, delivered expert insights, and showcased advanced techniques that will empower organizations to achieve CMMC 2.0 while improving their business operations. We helped prepare businesses for a future of security, success, and unparalleled opportunities in defense contracting! In this webinar, we covered: The CMMC 2.0 Overview Navigating the Timeline Risk Management The Proactive Appr...
Add Favorite
Domino Data Lab Responsible AI Informat...
Everyone needs Responsible AI (RAI) but confusion abounds about what it is, what it delivers and how to achieve it. Done effectively, RAI boosts AI impact by increasing adoption, quality, safety and reliability, while minimizing risks to organizational performance, reputation, litigation and regulatory penalties. In this session with ex-Forrester analyst Dr. Kjell Carlsson, Domino Data Lab discussed practical definitions of RAI, examples of be...
Add Favorite
Safeguarding Tomorrow with Cloud for Good
During our webinar with Cloud for Good: Safeguarding Tomorrow: Transformative Solutions for Child Welfare with Salesforce, experts discussed how ensuring the safety and well-being of every child is a shared responsibility, and how technology can play a pivotal role in achieving this goal. During this 45 minute, in-depth webinar, attendees discovered the power of Salesforce in enhancing child welfare services. Key benefits included: A comprehen...
Add Favorite
Emerging Trends in Capture: From the Ma...
In this on-demand webinar, attendees explored Federal Agencies Digital Guidelines Initiative (FADGI) and discover compliant solutions that future-proof your agency amidst evolving digital mandates.
Add Favorite
Unlocking Healthcare IT Success: Solvin...
This webinar is a part of Carahsoft's HIMSS 2024 Webinar Series exploring how to create tomorrow's health. In this on-demand webinar, SolarWinds Healthcare and Database experts dove into: Critical challenges confronting healthcare organizations and strategies for addressing patient and media scrutiny Essential techniques for enhancing database and IT infrastructure management, including leveraging observability tools and eliminating tool spra...
Add Favorite
Bridge the Gap Between Productivity and...
Remote access use cases have exploded across the government. Unfortunately, security is often not top of mind as these solutions are deployed, whether because they are urgently implemented or stretched for inappropriate use cases. Yet identities and their privileges are at the heart of almost every cyberattack today and remote access software could easily be misused or co-opted. Watch the on-demand recording to understand how BeyondTrust...
Add Favorite
Real-Time Decision Advantage
In the fast-paced world of modern data-driven operations, the ability to harness real-time insights at the tactical edge is critical. Whether in the fields of defense, emergency response, or critical operations, minimizing latency in order to ensure immediate access to data are not just important; they are essential for effective and efficient decision-making. During this webinar, attendees were able to: Discover the significance of real-time...
Add Favorite
Back to Search Begin New Search