Back to Search Begin New Search Save Search Auto-Notify
Why Intelligent Observability and Agent...
Organizations are under constant pressure to roll out new product features and enhancements to stay competitive. AI has emerged as a helpful tool, promising to boost productivity and streamline processes so organizations can focus on innovations that strengthen their core business, but many businesses are unsure of how to leverage AI effectively, let alone incorporate it into existing workflows. Intelligent observability (observability strengt...
Add Favorite
Restoring Trust in Every Digital Interaction
During this webinar, we explored how to detect and prevent threats like synthetic identities, account takeovers and impersonation.Attendees were able to:Understand today’s evolving identity fraud landscape and its impact on public trustLearn how to integrate fraud detection, identity verification and adaptive authenticationDiscover best practices for reducing friction for employees and constituents alikeSee how Ping Identity helps state...
Add Favorite
AWS & Autonomous AI: Revolutionizing Pu...
Public sector agencies are eager to harness the power of AI to improve service delivery, enhance security and operate more efficiently. Yet many find themselves stalled at the proof-of-concept stage. Complex regulatory requirements, data privacy concerns and the challenge of scaling innovation across diverse environments often stand in the way of real-world adoption. Agencies need practical strategies to move from experimentation to implementa...
Add Favorite
Reliable Communications for First Respo...
Experts from Samsara and Carahsoft discussed how public agencies and first responders are leveraging FirstNet Trusted™ solutions, telematics, and real-time data to strengthen safety, efficiency, and operational resilience.
Add Favorite
OSINT for Financial Crimes Panel
Our OSINT for Financial Crimes Panel explored how Open Source Intelligence (OSINT) is transforming financial crime investigations in the public sector. This timely event brought together government investigators, compliance experts and technology innovators to examine how OSINT is being leveraged to track illicit financial activity, strengthen enforcement and support prosecutions.Engaged in expert-led discussions on key OSINT priorities, inclu...
Add Favorite
Securing Federal Access: Identity Secur...
As government agencies continue to modernize their IT infrastructure and align with executive mandates for Zero Trust Architecture (ZTA), identity security becomes a critical pillar for cyber resilience. This webinar, hosted by BeyondTrust and Optiv + ClearShark, explored how government agencies can formalize and accelerate their zero trust implementation with Identity Security Insights that illuminate exposures in their identity security post...
Add Favorite
Secure Development & ATO in 2025: Study...
During this webinar, Bruce Warren, CMO, Security Compass, moderated a conversation with Jay Ryan, Program Manager, Security Compass and Gary Edwards, Co-Founder, Golfdale Consulting on:What the 2025 State of Secure Development & ATO in U.S. Government Agencies report reveals about current practices--and the gaps that still hold teams back.Why traditional "find and fix" approaches and manual compliance methods are no longer sustainable.How...
Add Favorite
The Future Belongs to Learners Series:...
Attendees learned how a ChatGPT Agent executes multi-step tasks, integrates with connectors and turns natural-language instructions into automated outputs. This session breaks down core functions, government-relevant use cases and the security and admin controls that govern the feature.Attendees Gained:A clear understanding of ChatGPT Agent’s core functions and differentiatorsGuidance on governance, permissions, and admin controlsExample...
Add Favorite
Solving the AI Bottleneck: Storage Arch...
In this technical session, we explored how VDURA's V5000 and VPOD architectures addresses the unique performance, scalability and compliance challenges of modern AI workloads. From metadata-intensive language model training to multi-model defense applications, we broke down how unified namespaces, dynamic data acceleration and parallel I/O paths eliminate traditional constraints on AI pipelines.Attendees gained insight into: How to overcome me...
Add Favorite
Optimizing Cyber Readiness in Federal A...
The Cyber Operational Readiness Assessment (CORA) is crucial for evaluating and enhancing cybersecurity and mission resilience within Defense and Intelligence agencies. Integrating vast volumes of security, risk, and mission data into actionable insights demands continuous, real-time monitoring. This session showcased how the ServiceNow AI platform, utilizing Security Operations (SecOps) and Integrated Risk Management (IRM), offers federal age...
Add Favorite
Back to Search Begin New Search