1,868 webcasts found
+ 12660 past events found
Back to Search Begin New Search Save Search Auto-Notify
Mastering SPL with AI: Introducing the...
This webinar explored the transformative features of the Splunk AI Assistant, a generative AI-powered app designed to make SPL more accessible within the Splunk platform. This session showcased how the app facilitates the learning of SPL through natural language prompts and simplifies complex SPL commands into understandable segments. During this webinar, participants:Discovered how to use natural language prompts to generate SPL commands, mak...
Add Favorite
2024: FAR Part 44, Subcontracting Polic...
Join Washington DC based, Jennifer Schaus & Associates in the 2024 Webinar Series covering The FAR, Federal Acquisition Regulations. This series features guest speakers who will uncover the important details and nuances of The FAR. Get educated about the rules and regulations in the game of federal contracting. This series is COMPLIMENTARY & RECORDED. Recordings are posted on our YouTube Channel. CORPORATE SPONSORSHIPS of this Webinar...
Add Favorite
Staying Ahead in the Evolving Landscape...
Attendees joined us for a webinar designed to help government agencies navigate CJIS compliance and explore the latest security measures. Attendees gained insights from real-world case studies, including the City of Garland and the City of Northport, showcasing the practical implementation of TecMFA and Tectango for Police. They also discovered how these solutions streamline operations, improve data security, and contribute to CJIS compliance....
Add Favorite
Lunch and Learn on Enhancing Public Sec...
This exclusive briefing session focused on the critical issue of security debt within federal applications. Hosted by Veracode, a leading authority in software security, this event provided insights and strategies for addressing security challenges unique to the public sector. Veracode’s State of Software Security 2024 report sheds light on the pervasive issue of security debt in today’s applications, serving as a call to action fo...
Add Favorite
Consolidation. Automation. Security. Ju...
Healthcare IT teams of all sizes and experience levels are tasked with enabling medical staff to provide the best possible patient care. However, efficiently supporting a wide variety of medical devices, often shared and mobile, spread across sprawling medical campuses is not easy. It's even more daunting when you consider the increase threat of cyberattacks seeking to steal lucrative patient health information (PHI) or mount a successful rans...
Add Favorite
Securing and Optimizing the Modern Deve...
In software development, efficiency and security are essential to innovation and operational success. As agencies and organizations have moved their testing and production to the cloud, development environments often lag, using outdated systems that reduce productivity and compromise security. Attendees joined us online to learn how Coder helps organizations create a centralized development network, which improves security and control and prov...
Add Favorite
Maximum ACFR Automation for States, Lar...
On June 27th Workiva hosted a webinar with F.H. Black. Attendees learned why and how the largest, most complex public sector organizations are leveraging technology to drive efficiency —automating journal entries, GAAP/Closing packages, GASB 87/96/94, and reducing ACFR preparation time by 50+ percent. During this webinar, attendees:Learned why these organizations are prioritizing productivity improvement for their finance teams.Discovere...
Add Favorite
Forescout Contract for Comply-to-Connec...
After November 30, 2024, DISA will no longer be providing free Forescout software licenses, professional services and training for the Comply-to-Connect (C2C) program. Over the past few years, the C2C contract with Forescout has enabled thousands of DoDIN users to receive Forescout licenses from DISA at no cost to the users’ budget. To this day, Forescout is still the backbone of C2C, which provides device visibility, device control, NAC...
Add Favorite
CTO Sessions: How-to Guide for Enhancin...
Sensitive data stored in HPE deployments must be encrypted edge-to-cloud. For encryption to successfully secure sensitive data, the cryptographic keys used to encrypt/decrypt data must be secured, managed and controlled by the data owner. Thales TCT’s CipherTrust Data Security Platform unifies data encryption and unprecedented granular access controls with centralized key management—all on a single platform. This results in fewer r...
Add Favorite
End-of-Life IT & Spilled Data Raises Br...
Join Carahsoft and Blancco and hear how to redeploy government computer drives, assets, devices, and other hardware to lower costs and provide increased value to federal agencies. During this session, Eddie Prothero and David Robinson addressed some events that require sanitization:Hardware refreshesRecords retention expirationsContract or project completionsOverseas or emergency military movementsStaff changesData migrations
Add Favorite
Back to Search Begin New Search