1,870 webcasts found
+ 12695 past events found
Back to Search Begin New Search Save Search Auto-Notify
Automate and Improve Your Cyber Operati...
The Cyber Operational Readiness Assessment (CORA) program evaluates the cybersecurity posture and resiliency of each Authorization Boundary using a broad set of security, risk, and mission data. The problem for Defense and Intelligence Agencies is that they face limitations when trying to combine this data in meaningful, efficient ways that keep them continuously prepared for inspections.In our recent webinar, our Security and Risk Solution Co...
Add Favorite
Accelerating AI Adoption: Bridging Fede...
Join us for an engaging and informative session that bridges the gap between federal and defense AI applications, offering actionable strategies to accelerate AI adoption and leverage its full potential in defense operations. Our panel of experts will delve into the comparative analysis of AI adoption within the U.S. Federal Government and the Department of Defense (DOD). They'll also explore the strategic integration of AI technologies across...
Add Favorite
Stop Advanced Threats: Unify Endpoint a...
View this complimentary webinar from Fortinet and CrowdStrike, where we explored how organizations can protect themselves from advanced threats, simplify security and strengthen their network. Advanced threats demand a stronger and smarter defense. Fortinet and CrowdStrike have partnered to deliver a seamless, AI-powered security solution that integrates firewall and endpoint protection—so you can stay ahead of cyber threats with ease. C...
Add Favorite
How Verkada Can Help Secure K-12
K-12 schools are increasingly adopting Verkada solutions to enhance security, ensure student safety, and reduce vaping incidents. The platform’s simplicity, advanced technology, and focus on privacy make it ideal for addressing the unique challenges of school environments. During this webinar, attendees learned about:Overview of VerkadaCamera capabilitiesVape sensorsGuest accessAccess control
Add Favorite
Beyond VPNs: Identity-First Zero Trust...
In this webinar, attendees:Understand the advantages of Identity-First Zero Trust connectivity over traditional VPNs, IPSec tunnels, SD-WANs, and conventional ZTNA—especially for Non-Human Identity (NHI) and ICAM use casesGain deep insight into Zero Trust principles, identity-centric network overlays, and Secure-by-Design architectureExperience the real-time deployment of Zero Trust Networks-as-a-Service using NetFoundryDiscover key ente...
Add Favorite
Transforming Federal Financial Reportin...
Attendees joined us on June 12th to explore how Workiva's cutting-edge capabilities can automate and simplify even the most complex Annual Financial Report (AFR) requirements. During this webinar, attendees uncovered actionable strategies to drive transformational efficiencies in their financial reporting processes. Our expert panelists also discussed how your agency can leverage Workiva to enhance report quality, usability, and transparency....
Add Favorite
Securing and Optimizing the Unified Network
CDW/Sirius Federal, Dell, Versa, NetScout and Vcinity took a look into their unique approach at securing and optimizing the unified network. This session focused on DOD initiatives around zero-trust principles and a data-centric posture, aiming for a secure and resilient network within mission-critical environments around the world. We discussed the specific challenges faced during this process including: security vs speed, bandwidth and netwo...
Add Favorite
Google Workspace & Dito Hartford Roadshow
This workshop was designed to provide hands-on experience with Google Workspace, explore the possibilities of generative AI, and learn how Google Workspace can enhance your security posture.During this workshop, attendees learned to:Explore Google Workspace tools to boost productivity and collaboration.Learn how Gemini AI can assist in creating videos, creating podcasts based on grounded sources, and can assist in writing and creating material...
Add Favorite
Photo Editing Made Easy with Beginner W...
Whether you're just getting started or need a refresher, this back-to-basics webinar is designed to help public sector teams confidently manage, edit, and share visual content using Adobe Bridge and Lightroom. These tools are essential for organizing image libraries, improving content quality, and maintaining consistency across digital materials used in outreach, documentation, and internal communications. In this beginner-friendly session, Ad...
Add Favorite
Quantum Technologies and the Public Sec...
Quantum technologies are rapidly moving from research labs into real-world applications. For government and public sector IT leaders, gaining a clear understanding of quantum computing, quantum networks, and post-quantum security is essential for making informed strategic decisions. These developments are reshaping the future of data protection, communications and mission-critical systems across the federal enterprise.In this session, Bob Gour...
Add Favorite
Back to Search Begin New Search