Navigating the Weaponization of Supply Chains
Access this webinar to learn how geopolitical dynamics are reshaping global supply chains and impacting government procurement strategies. This webinar covered real-world examples of supply chain weaponization, highlighting risks from dependence on foreign suppliers, especially those threatening U.S. security. Topics included trade restrictions, material shortages, and cybersecurity threats, with actionable strategies for building resilient, s...
Enhancing Your IT Infrastructure with S...
Attendees joined us for our AppDynamics webinar to gain expert insights into application performance monitoring, observability, and IT operations. They learned about the latest features and real-world use cases that can help optimize applications and infrastructure. Engaged in interactive Q&A session with industry experts to get personalized guidance on troubleshooting and performance improvements. Best of all, this free webinar provided a...
2025: DFARS Part 209, Contractor Qualif...
Join Washington DC based, Jennifer Schaus & Associates in the 2025 Webinar Series covering The DFARS, Defense Federal Acquisition Regulations Supplement. This series features guest speakers who will uncover the important details and nuances of The DFARS. Get educated about the rules and regulations in the game of federal contracting. This series is COMPLIMENTARY & RECORDED. Recordings are posted on our YouTube Channel. CORPORATE SPONSO...
Unlocking Bigger OpenText DevSecOps Dea...
MFGS, Inc. and Carahsoft hosted an exclusive partner enablement session on March 24. This event was designed to empower you with key insights and strategies to boost your OpenText DevSecOps sales and close more deals.During this event, attendees gained insight into:How OpenText’s DevSecOps Software fits into DevSecOps environments.Tips to identify opportunities to help customers integrate OpenText’s software into existing DevSecOps...
Navigating AI in the Modern Landscape w...
We invite you to view our complimentary Demo Desk: Navigating AI in the Modern Landscape with Fortinet. Learn more about the ever-changing landscape of technology regulations in the modern world. In the first demo of our series, we looked into what AI has accomplished, what's next for AI and how your organization can adapt and support others after the wave of recent policy changes. We also reviewed the new administration's impact and how Forti...
Zoom for Government Webinar Series - Ma...
Zoom for Government is for your mission. We enable the federal mission through an easy-to-use and innovative collaboration platform. Watch our March sessions on-demand exclusive to the public sector!
Built for Government: How Embedded Endp...
Did you know that Absolute’s endpoint security solution is embedded directly into government-used device firmware, offering unique advantages for enhancing control, resilience and compliance?In this session, we explored how agencies use Absolute to:Enforce robust security policiesDetect and recover from IT disruptionsStrengthen cyber resilience with persistent endpoint monitoring, automated repairs and geofencing for secure operations
Building Accessible Dashboards
This insightful webinar was on the art of creating accessible data visualizations. Key principles for designing dashboards that cater to a wide range of user needs were taught, ensuring that everyone can see and understand data effectively. In addition to these best practices, we took a tour of the latest and upcoming Tableau features on accessibility, highlighting the enhanced usability experiences.During this webinar, attendees learned:Essen...
Omnissa Partner Day
Those who joined us at our Omnissa Partner Day were able to attend our various sessions, meet with our representatives, and close the night with a happy hour.By attending our sessions, attendees got the opportunity to hear about topics like:Discovering Omnissa: Our Story, Mission, and VisionUnlocking Growth: How Omnissa Empowers PartnersPartnering with Omnissa: Strategies, Benefits, and Success in the Channel
How to Enforce Least Privilege Across E...
Endpoint security serves as the frontline defense in protecting your institution’s network from a wide array of threats originating from devices that connect to the enterprise network, such as laptops, smartphones, and tablets. These endpoints are often the targets of cyberattacks as they provide access points to the organizational network, making them vulnerable to malware, ransomware, and more. By securing these endpoints, institutions...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.