Back to Search Begin New Search Save Search Auto-Notify
Improving the Student & Employee Experi...
Learn from Google Cloud experts as they share how Google’s artificial intelligence (AI) tools can help higher education institutions increase engagement with their students, improve the student experience, and impact student success and retention. They will share relevant trends in education and research, while highlighting compelling customer stories. Bring your whole team and start the discussion of how you can use Google Cloud AI to...
Add Favorite
From Awards to Grievances, Are You Prop...
It is surprising how many organizations continue to use spreadsheets, manual processes, and one-off solutions to improperly manage Employee Relations. Instead, a secure, accountable, and integrated solution is required to properly manage harassment (sexual and non-sexual), behavioral issues, discrimination, performance, policy violations, etc. Join us as we discuss and demonstrate: Process efficiencies (reduced manual effort) and enhanced secu...
Add Favorite
Redefining Resilience with Cyber Recovery
Ransomware is more sophisticated than ever, and attacks are no longer confined to disrupting just production. While most enterprises feel prepared to recover, the truth is backup data — even immutable — can fail to protect against the more advanced attacks. In this webinar, we’ll cover these important topics:The Increasing Intelligence of Ransomware: Understand the anatomy of an enterprise ransomware attack and the attack pat...
Add Favorite
Attack Surface Management and Threat In...
Join Google Cloud to learn how Public Sector organization's attack surfaces are constantly expanding and evolving. cloud resources, unmanaged assets, code repositories — all internet facing assets have the potential to be exploited if there is an unmitigated vulnerability, misconfiguration, or exposure. This is where threat intelligence provides a valuable role to help you and your teams prioritize what needs attention and why. Durin...
Add Favorite
Dynatrace Government User Group: Charti...
Watch this on-demand webinar as Dynatrace hosted a Government User Group on Charting the Course For Automation and AI. At the event, Dynatrace experts shared insights on AIOps, the practice of using artificial intelligence (AI) to automate and enhance IT operations.
Add Favorite
AI & Machine Learning Operations with T...
It is clear by now that AI has revolutionized the world of technology as we know it. Organizations have started to think about adopting an AI strategy for their enterprises, but most are unsure of where to begin. Enterprises are looking for a way to cut through the noise with a plan that just works, across clouds and with efficiency at scale. With Tanzu Application Platform (TAP) and VMware Data Solutions, ML engineers can implement end-to-end...
Add Favorite
Enabling the Modern Government
In this webinar, we'll show you how Juniper's AI-Driven solutions can help your organization: Reduce break/fix tickets due to proactive intelligence about your network. Significantly reduce Mean Time to Repair from Marvis insights. Achieve controllerless Wi-Fi with BLE for asset tracking, location services and more. Gain insight and metrics for LAN, WAN and Wireless performance with the ability to set SLAs for multiple metrics within...
Add Favorite
Protect Your Government Agency's Data a...
Modernizing applications and migrating to public cloud platforms enhance agility and flexibility. But there are also trade-offs to consider, including new and borderless attack surfaces, lack of consistent visibility, and growing tool sprawl and tool expenses. Together, Gigamon and Sumo Logic enable organizations to build an effective and efficient monitoring and security posture that surfaces a level of understanding unattainable beforehand....
Add Favorite
Risk Intelligence: Proving Your Cyberse...
Cybercrime is evolving at the speed of innovation, sometimes outpacing the progress of cybersecurity. Cybercrime often has the advantage as it is highly motivated and not bound by the many required compliance and regulatory mandates that businesses face. Threat intelligence can be a useful ally, enriching the process of audit and assessment, and providing proof of security controls and policy enforcement that is required for security and comp...
Add Favorite
IACP Webinar Series: SNIPR, AI-Driven V...
In an era where digital evidence is amassed at an unprecedented rate, law enforcement faces the daunting challenge of comprehensively reviewing every second for critical content and potential evidence. The proliferation of audio, video, and multimedia footage can lead to vital evidence being overlooked and significant delays in investigations, hampering the apprehension of suspects and the timely dispensation of justice. Technology poses chal...
Add Favorite
Back to Search Begin New Search