Transforming Public Service: How Geoloc...
How many times during your week or month do you navigate a map to make decisions about things like where you’re going to dinner, your running route, or which dry cleaner is closest to your office? What if finding a government service could be just as user-friendly, in an application that is familiar? During this webinar, Avaap explored how geolocation technology is transforming government services. We investigated the innovative solution...
F5 Capture the Flag
The F5 DISA team hosted an interactive Capture the Flag competition where attendees competed against others to hunt for API vulnerabilities and learn how they work. In this lab and Capture the Flag exercise, attendees learned how to identify and mitigate:Hard-Coded Secrets: Many applications exchange user credentials for a hard-coded token or key. This key allows anyone who knows it to gain access to the application, however, many times these...
The Circle of Viz: Content Promotion Li...
Discover strategies for managing projects, user groups and content permissions to effectively promote and distribute content across your Tableau environment. Learn how to streamline Tableau content management, simplify processes and boost work efficiency. During this webinar, attendees learned:The Key Metrics of Success: Develop a plan and set measures to gauge the success of Tableau content promotion efforts.Site and Project Architecture: Div...
Operationalizing Zero Trust: NIST and B...
Over 15 years since its initial conception and more than three years since the U.S. federal government made it a fundamental tenet of its overall cybersecurity strategy, Zero Trust has only become more important as a strategic framework for government and critical infrastructure alike. While the imperative to implement Zero Trust has been well established, the question of “how” is less clear. Enter NIST and the National Cybersecuri...
The History of Seepage Technology Development
A historical timeline will be presented that describes the significant seepage-related failure case histories and how various technology developed for seepage analyses and evaluations, including potential failure modes. The history of seepage technology begins in the 1800's but accelerates in the early 1900's and through the late 1980's. Each critical milestone in the evolution of seepage technology will be identified along with key published...
How to Engage with CIOs
In this exclusive partner webinar, Ted Brodheim, former CIO and current Global CIO Advisor at Zoom Communications, shared his expert perspective on successfully engaging with Chief Information Officers (CIOs).In this session, Ted provided Zoom resale partners with a deeper understanding of what CIOs prioritize when purchasing technology, how they navigate the buying process, and how to foster strong relationships with these key decision-makers...
HHS IT Simplified: Why Automation Matte...
Red Hat and Carahsoft hosted an HHS exclusive webinar on February 12th on a technical overview of Red Hat Ansible Automation Platform. This session explored:Key features and capabilities of Ansible tailored for HHS needsBest practices for scalable IT automationThe latest updates and enhancements in Ansible Automation Platform
Use Cases in Threat Intelligence: Turni...
Attendees gained essential insights on modern cyber threats with experts from Google Public Sector and August Schell. The session explored the latest trends and emerging threats targeting U.S. Navy operations, aimed at strengthening cybersecurity and enhancing maritime security. Highlights included:A detailed overview of the current cyber threat intelligence and emerging trends targeting the U.S. public sector.Insights from Mandiant's latest t...
PQC Migration: Where Are We Now?
Recent announcements from the likes of NIST, Gartner, and Google have highlighted the importance of post-quantum cryptography. These announcements have increased the sense of urgency for PQC migration. Given that PQC migration is a long-term and resource-intensive task, many are asking where the cryptography industry stands at this point. They want to know how they should be managing their PQC migrations, what kinds of tools they will need to...
Beyond the Generative AI Hype: Practica...
Experts shared insights on how Generative AI had been a transformative technology capable of revolutionizing public sector services by enabling AI agents to:Simplify communication by understanding everyday language.Converse with residents in their preferred language.Gather complete information through straightforward questions, reducing delays.Recommend relevant services for review and approval.Autocomplete paperwork using existing documents.H...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.