Back to Search Begin New Search Save Search Auto-Notify
Real-Time Cloud Security Starts with Co...
Attendees were able to explore:How attackers exploit disconnected workflows across AppSec, CloudSec and SecOpsHow best-in-class cloud security and SecOps on a single, unified platform shuts down threats significantly faster and more efficientlyWhy a unified CNAPP + CDR architecture reduces complexity, cost and risk
Add Favorite
How Agencies Are Saving Big and Serving...
In this webinar, Atlassian and Clovity demonstrated how Jira Service Management could help government agencies achieve immediate results by modernizing IT and business operations with cloud and automation. Public sector teams explored how they could:Automate workflows to quickly improve service for employees and citizensStreamline service delivery to reduce costs and meet the demands of the timeAccelerate modernization with practical steps tha...
Add Favorite
Advancing Military and Veteran Health I...
Military and Veteran Health IT leaders face unique security challenges requiring robust and flexible solutions. During this webinar, Zscaler spotlighted Trusted Internet Connections (TIC) 3.0 and its pivotal role in strengthening security while enabling seamless interagency collaboration. Attendees gained insights into implementation strategies and compliance requirements that align with the dynamic needs of the Federal health community. What...
Add Favorite
It's Not the Breach. It's the Spread: I...
This session explored the critical role of cyber resiliency in helping organizations withstand and recover from today's evolving threats. We dove into strategies for reducing attack surfaces, visualizing networks, and securing critical IT assets – while also examining how compliance regulations can enhance security and safeguard sensitive data. During this webinar, attendees:Gain actionable insights to strengthen their security postureLe...
Add Favorite
The Four Pillars of Strategic Onboardin...
In today’s competitive talent landscape, first impressions matter more than ever. Organizations that prioritize a thoughtful, structured onboarding experience see measurable results—higher retention, faster ramp-up times, and stronger engagement from day one. But delivering this at scale, across roles and teams, requires both strategic clarity and the right technology. Watch this on-demand webinar to hear from HR and eLearning expe...
Add Favorite
Maximize Horizon's Potential with Horiz...
Public sector organizations are under pressure to deliver secure, scalable, and efficient, digital workspaces often with limited internal resources and rising operational demands. Whether you are managing virtual desktops for remote staff, modernizing legacy infrastructure, or transitioning VDI environments, the need for expert support is clear. This webinar focused on exploring how Omnissa Horizon Accelerator can help you deploy, operate, and...
Add Favorite
Effortless Content Creation with Integr...
Need to create professional graphics without a steep learning curve? Whatever you’re designing, Adobe Express makes content creation fast, easy, and on-brand—perfect for communications, outreach, and public engagement. Watch our on-demand webinar to discover how Adobe Express empowers government teams with intuitive design tools, automation, and built-in brand controls—all in a browser-based platform that works anywhere. In t...
Add Favorite
AI & Automation in Action: Modernizing...
Artificial intelligence (AI)-enabled software automation significantly enhances the operations and management of critical systems essential to national security, law enforcement and data analysis within the Department of Homeland Security (DHS) and the Department of Justice (DOJ). Red Hat OpenShift AI and Red Hat Device Edge, combined with Dynatrace’s observability tools, provide robust solutions for and drive automation within these sys...
Add Favorite
Respond Faster, Resolve More with Jira...
Government IT teams are being asked to do more with less while delivering faster, compliant services without disruption. The right ITSM approach can make all the difference. In this session, attendees learned how to:Understand CMDB fundamentals to improve visibilityOptimize incident response for faster resolutionDrive compliance without slowing your teams down
Add Favorite
Zero Trust in Action: Securing Identity...
In today’s hybrid, cloud-first world, identity and data have became the new security perimeter. Applying a Zero Trust model was essential to protecting these assets and ensuring operational resilience. This on-demand webinar featured Microsoft experts sharing practical strategies for implementing Zero Trust using Microsoft Entra ID and Microsoft Purview. During the webinar, attendees:Prevent unauthorized access and protect user identitie...
Add Favorite
Back to Search Begin New Search