4,253 webcasts found
+ 63264 past events found
Back to Search Begin New Search Save Search Auto-Notify
F5 API Security & Observability Workshop
Attendees joined Peter Scheffler, Sr. Solutions Architect at F5, and Jay Peņa, Solutions Engineer at F5, for a hands-on interactive workshop focused on API security and cybersecurity best practices. Hosted at the Cyber Bytes Foundation's Quantico Cyber Hub, this workshop provided participants with the opportunity to deepen their knowledge, uncover vulnerabilities, and develop actionable strategies to better protect their APIs. Attendees who jo...
Add Favorite
Flexible Grants Management in an Era of...
As the grants landscape continues to evolve, agencies need to strengthen their existing proactive approach with proven strategies for future success. Watch our on-demand webinar to discover practical techniques for building data collection systems that capture both current requirements and anticipate future needs. Dive deep into sophisticated impact measurement techniques that powerfully demonstrate your program's value to stakeholders and str...
Add Favorite
Accelerating Discovery with the Power o...
In today's fast-evolving digital landscape, federal scientific agencies must manage hybrid clouds while maintaining security and efficiency—often with limited resources. Manual operations can slow innovation, create inconsistencies and drain critical resources. At this exclusive Red Hat webinar, attendees learned how Red Hat Ansible Automation Platform empowers agencies to automate network operations, enhance security and improve efficie...
Add Favorite
F5's AI Gateway: The One-and-Done Solut...
Attendees joined us for an in-depth discussion on how AI architectures are designed. Attendees learned from F5's AI experts on where AI applications are most vulnerable (and why) and how F5’s portfolio of security solutions, including AI Gateway, can help protect those applications. We also dove into how API discovery helps you architect AI applications. Lastly, the MVP will be a demo of F5’s AI Gateway!
Add Favorite
Introduction to Computational Fluid Dyn...
This webinar aims to provide an introduction to CFD modeling by focusing on the following: History of CFD modeling Fundamentals of CFD modeling Critical components of a CFD model Application of CFD models for dam and levee safety Benefits of CFD modeling How to setup a CFD model - A step-by-step guide Role of the Modeler in CFD modeling Why not CFD modeling? Learning objectives attendees will receive from this webinar: Understand the basics of...
Add Favorite
Building Tomorrow's Workforce with Sale...
In the webinar, participants discovered how Salesforce’s Talent Recruitment Management is revolutionizing public sector hiring. The session explored how this innovative solution can streamline the entire talent management journey—from workforce planning through retirement—empowering agencies to accelerate hiring, improve the candidate experience, and ensure compliance. What Was Explored:Leverage Salesforce's Talent Recruitmen...
Add Favorite
How to Protect Assets in a Connected Wo...
Attendees were joined by Connor Rhodes, Enterprise Solutions Engineer at Verkada, on Thursday, March 27th, as he walked through:Cybersecurity principles for both on-prem and cloud-based systemsHow to safeguard risks that organizations face todayAnd so much more about Verkada's security solutions for state and local government organizations
Add Favorite
Leveraging Public Data to Identify FOCI...
Foreign Ownership, Control, or Influence (FOCI) poses a growing risk to US government contractors, especially amid increasing investment from various governments, specifically China, into foreign companies. Understanding these vulnerabilities is crucial to preserving US and allies' national security.Listen to our expert speakers as they demonstrate how to detect FOCI risks by analyzing ownership structures, supply chain exposure, and dual-use...
Add Favorite
Cyber Resilience at the Crossroads
Cyber threats against U.S. infrastructure and the defense industrial base (DIB) are increasing at an alarming rate. Attacks from nation-state actors are compromising supply chains, contractors, and small-to-medium businesses at unprecedented levels. The White House’s NSM-22 directive underscores the urgency of securing critical infrastructure—but many organizations remain vulnerable. Topics discussed during this event include:How n...
Add Favorite
Simplify, Scale, Succeed: The Power of...
Managing hybrid clouds can be challenging, automation turns complexity into simplicity. Attendees to this webinar learned how automating your cloud infrastructure with Red hat Ansible Automation Platform can simplify management, reduce manual tasks and ensure greater scalability and security for state and local governments, as well as educational institutions. Attendees joined us virtually for a discussion on how Red Hat Ansible Automation Pla...
Add Favorite
Back to Search Begin New Search