Back to Search Begin New Search Save Search Auto-Notify
Operation Missionforce Control: The Dig...
Managing a Federally Funded Research and Development Center is one of the most complex leadership challenges in the nation. DOE labs like Los Alamos face mounting pressure to deliver on national security missions while navigating outdated systems and disconnected data. This “flying blind” approach risks delays, overruns, and safety incidents that threaten performance-based fees and core objectives. Attendees explored a proven model...
Add Favorite
OT Security for Tribal Governments: Pro...
Tribal governments oversee a diverse mix of critical systems — from water treatment plants and healthcare facilities to casinos and education networks. This unique combination makes them an ideal target for cybercriminals because they face tight budgets, limited cybersecurity resources, and high visibility within their communities. Even small attacks can cause significant disruption and gain unwanted publicity. Attendees joined us to lea...
Add Favorite
Voice Security in the Public Sector: De...
The voice channel is the most under-protected entry point into public sector organizations, and attackers know it. From AI-powered vishing and social engineering to spoofed calls, robocalls, and voice spam storms, adversaries are weaponizing telephony to bypass traditional defenses and compromise sensitive data. During this exclusive webinar, hear from experts who will expose the current voice threat landscape, reveal attack tactics and trends...
Add Favorite
Five Unhealthy Mistakes to Avoid When A...
Topics covered in this webinar:Neglecting a Formal Archiving StrategyMerging Patient DataCreating Mini EHRsStaying Loyal to your Original LDA VendorArchiving With the Incumbent EHR
Add Favorite
Agentic AI workshop: Train your first c...
Think AI model training is only for data scientists? Think again. Join this free hands-on workshop where you'll train and fine-tune a real cybersecurity model — no advanced math or data science degree required. As a cybersecurity professional, you should be training AI models. Your expertise is exactly what's needed to build effective AI-powered defenses. In this 90-minute, interactive session, you’ll learn some of the same skills...
Add Favorite
Fighting Fraud Without Friction
Plum is the first “built for government” identity validation solution. It calculates an applicant's risk score using tens of thousands of data points to identify stolen and synthetic identities, bots, drop houses, mules, suspicious devices, and foreign and domestic fraud organizations. Watch this on-demand webinar to discover best practices that governments should consider to improve program safeguards. Specifically, viewers will l...
Add Favorite
Faster Investigations, Smarter Seizures...
Discover how AI surfaces hidden connections, translates massive amounts of unstructured data into insights and gives investigators a decisive edge in tracking and apprehending criminal actors.In this webinar, attendees learned:Ways AI surfaces and prioritizes suspects, saving valuable time by finding “needles in haystacks”Techniques to illuminate criminal networks and map hidden relationships between people, events and locationsHow...
Add Favorite
Intelligent Data for JADC2: Powering Mi...
The Department of War faces immense pressure to enhance operational effectiveness, yet critical initiatives like Joint All-Domain Command and Control (JADC2) are complicated by overwhelming volumes of fragmented, siloed data and persistent challenges with outdated legacy systems. These issues hinder efficient data migration, leave vital information unprepared for scalable AI and cause modernization delays that impact mission readiness.Unlockin...
Add Favorite
Spot the Phish! Email Security with Splunk
Learn how Splunk Attack Analyzer empowers SLED IT teams to quickly identify phishing threats and automate response actions, reducing manual effort and improving security outcomes. In this webinar, attendees learned:Understand why phishing attacks are increasingly complex and manual analysis is unsustainableLearn how Splunk Attack Analyzer automates threat analysis to save analysts timeSee real-world results showing better detection accuracy an...
Add Favorite
The Future Belongs to Learners Series:...
Take your ChatGPT skills to the next level. In this session, participants learned how to use advanced tools - Deep Research, Projects, Data Analysis, Canvas, Connectors, and ChatGPT Agent - to move from simple prompting to structured, repeatable workflows. OpenAI demonstrated how these capabilities helped government teams collaborate, analyze data, and deliver results more efficiently while maintaining enterprise security and compliance.What P...
Add Favorite
Back to Search Begin New Search