Geospatial for Tactical Analysis
Snowflake hosted an immersive, hands-on training session designed for public sector professionals to harness their advanced geospatial capabilities for mission-critical analysis. Participants learned to perform bounding searches, co-traveler analysis, and focus area identification to detect activity hotspots. The session also covered advanced visualization techniques, including HEX grids and histograms, path characterization with line-string a...
Faster Investigations, Smarter Seizures...
Discover how AI surfaces hidden connections, translates massive amounts of unstructured data into insights and gives investigators a decisive edge in tracking and apprehending criminal actors.In this webinar, attendees learned:Ways AI surfaces and prioritizes suspects, saving valuable time by finding “needles in haystacks”Techniques to illuminate criminal networks and map hidden relationships between people, events and locationsHow...
Fighting Fraud Without Friction
Plum is the first “built for government” identity validation solution. It calculates an applicant's risk score using tens of thousands of data points to identify stolen and synthetic identities, bots, drop houses, mules, suspicious devices, and foreign and domestic fraud organizations. Watch this on-demand webinar to discover best practices that governments should consider to improve program safeguards. Specifically, viewers will l...
Spot the Phish! Email Security with Splunk
Learn how Splunk Attack Analyzer empowers SLED IT teams to quickly identify phishing threats and automate response actions, reducing manual effort and improving security outcomes. In this webinar, attendees learned:Understand why phishing attacks are increasingly complex and manual analysis is unsustainableLearn how Splunk Attack Analyzer automates threat analysis to save analysts timeSee real-world results showing better detection accuracy an...
The Future Belongs to Learners Series:...
Take your ChatGPT skills to the next level. In this session, participants learned how to use advanced tools - Deep Research, Projects, Data Analysis, Canvas, Connectors, and ChatGPT Agent - to move from simple prompting to structured, repeatable workflows. OpenAI demonstrated how these capabilities helped government teams collaborate, analyze data, and deliver results more efficiently while maintaining enterprise security and compliance.What P...
Employing AI to Bring Order and Value t...
Key topics included:The challenges associated with traditional document management processes and technologyHow advanced technologies like Artificial Intelligence and Machine Learning bring time savings and order to high volume, multi-stage document processingTaking advantage of the resulting improved data to streamline business processes
Building Your AI BD Program for 2026
ChatGPT has become a go-to tool for many in GovCon BD, but using it effectively — and safely — is another story. In this webinar, we’ll demonstrate practical ChatGPT use cases for business development, show how to reduce risks around compliance, accuracy, and security, and then compare those results against secure, purpose-built AI solutions designed specifically for GovCon. You’ll see side-by-side examples and walk awa...
Hyland & AWS Digital Transformation Jou...
Digital transformation isn’t a one-size-fits-all leap — it’s a journey. Whether you’re exploring possibilities or looking to fully optimize your operations, Hyland & AWS's three-part webinar series will guide you through each stage of the process: Crawl. Walk. Run. Hyland & AWS experts hosted online sessions to break down practical steps, proven strategies and real-world examples to help your agency confidently...
Archer Continuous Controls Monitoring
In this webinar, attendees explored:How Cypago connects and analyzes data to automate IT complianceThe role of Archer Continuous Controls Monitoring in reducing manual effortBest practices for integrating Archer and Cypago to enable continuous monitoringPractical use cases for streamlining audits and strengthening compliance posture
Beyond MDBR: Why SLED Organizations are...
MS-ISAC’s free Protective DNS (MDBR) ended on October 1. With funding discontinued, the need to act is urgent. But this moment presents more than just a replacement decision; it’s an opportunity to upgrade this critical layer of cyber defense. Infoblox Threat Defense is the mature, best-in-class alternative, trusted by Federal and SLED organizations to deliver proactive, intelligent and resilient DNS-layer security. It ensures comp...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.