Securing Critical Data & Apps with Late...
Cyberattacks including ransomware and web-based attacks are unrelenting. Building true security resilience requires more than perimeter defenses; stopping lateral (east-west) movement quickly is critical, and traditional firewalls alone are not enough. There are also disparate security tools that complicate and slow down defenses.This webinar walked through real-world attack scenarios, tracing the data path to demonstrate a comprehensive, laye...
Keeping Business-Critical Content and D...
This webinar discussed a practical overview of how Reveille supports leading public-sector platforms, including OpenText, Tungsten Automation, Hyland, ABBYY, IBM and Microsoft environments. During the webinar, attendees learned:How service-level assurance supports audit readiness, uptime mandates and citizen service continuityHow proactive alerting and automated remediation reduce mean time to detect (MTTD) and mean time to resolve (MTTR)How u...
Mission Connected: Secure Collaboration...
Government organizations and their mission partners face persistent gaps in mission connected collaboration across classified, coalition and isolated environments. Mission teams are often forced to switch systems, rely on manual workflows, or delay information sharing due to security constraints, which slows decision making and increases operational risk. Learn how agencies can enable mission access and timely collaboration across Mission Part...
Modernizing Public Sector with MuleSoft...
Public sector organizations are under increasing pressure to modernize legacy data foundations while adopting the transformative potential of artificial intelligence, yet disconnected data and outdated architectures often hinder secure, scalable innovation. In this virtual session, our expert speaker explored how MuleSoft serves as a unified platform for this evolution, covering the core principles of API-led connectivity and how a structured...
Deltek Costpoint Live Overview & Demo
Government contractors today face increasingly challenging market conditions. Intense competition, policy uncertainty, rising costs and evolving compliance requirements are putting pressure on both winning new business and maintaining profitability. Leading contractors are responding by optimizing resources, modernizing processes, and embracing automation and that’s where Deltek Costpoint can help. Join this live webinar to see how Costp...
Scaling AI for Government with Agent-En...
Agencies face growing pressure to deliver faster, more transparent public services while managing increasingly complex data environments. Disconnected systems, manual integration processes and limited visibility across sources hindered analytics, AI and mission-critical decision-making at scale. Data Management AI agents help agencies overcome these challenges by embedding intelligence directly into data operations, enabling automation and gov...
Combating Evolving Cyber Threats with A...
Panelists Mari Spina, Sr. Principal Cyber Security Engineer at MITRE, Jason Rogers, CEO of Invary, Gary Warner, Principal Cyber Architect at MITRE and Dr. Wesley Peck, CTO of Invary examined how attestation is evolving into a runtime capability that supports continuous verification. Panelists will discuss the role of attestation and runtime attestation across different layers of the system stack, how it is a necessary complement to existing cy...
Beyond Infrastructure as Code: Automati...
Now available on-demand, this webinar explores how Federal agencies are moving "Beyond Infrastructure as Code" to solve the modern challenges of multi-cloud complexity and shrinking team capacities.Experts from Tines demonstrated how to automate STIG compliance and RMF requirements, replacing manual toil with streamlined, automated patterns that improve audit readiness and operational efficiency.Viewers will gain a better understanding of how...
Beyond Patch Management: Proactive Expo...
Attendees of this webinar learned how to: Move beyond reactive vulnerability and patch management to a proactive exposure management strategyGain real-time visibility into known and unknown assets across the attack surfacePrioritize remediation using risk-based, intelligence-driven patchingAutomate remediation and self-healing to reduce exposure before incidents occurConnect discovery, patching, and remediation into an end-to-end exposure mana...
Navigating the Flash Crisis: Why Archit...
In this session, we examined the forces driving extreme flash price volatility and the real impact it has on AI and HPC storage strategies. Using real-world examples, we explored how architectural choices influence long-term cost, performance and flexibility, especially as NAND shortages and AI demand continue to reshape the market. The discussion focused on how organizations can meet GPU performance requirements without locking themselves int...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.