South Central Webinar Series: Improving...
Attendees of this webinar will learn how to: Detect threats based on telemetry, intelligence driven high volume detection, investigation, and hunting. Avoid ingestion based pricing and migrate to a fixed cost based ingestion that extends to high volume/value sources like EDR, XDR, proxy, Cloud, DNS, and more. Integrate your enterprise security telemetry data with unique global threat signals only available to Google.
Infoblox Demo Desk
Interested in learning more about Infoblox? Join our Infoblox-Certified Demo Jock for a 30-minute demo to learn how Infoblox can provide a smarter and more efficient way to manage and protect your network from the impacts on security that are arising due to evolving IT architectures. You will learn how to leverage the foundational infrastructure you already rely on every day – DNS, DHCP, and IPAM. Our presenter will also discuss how Info...
Consumable Artificial Intelligence and...
Integrating understandable artificial intelligence and machine learning into government decision-making is a common challenge throughout the public sector. Learn how Tableau makes artificial intelligence and machine learning (AI and ML) consumable for knowledge workers across your organization. The session will focus on public sector decision-making and is intended for beginner-level to advanced audiences.Join this session where attendees will...
New AI Insights, Same Familiar Interface
Integrating artificial intelligence (AI) and machine learning into existing analyst tools and applications is a sure way to accelerate adoption and enhance mission-critical decision-making. Learn how the Modzy extension for Tableau provides knowledge workers access to even more analytical insights, powered by a centrally governed library of AI and machine learning models. This session will focus on the importance of integrating model operation...
REAL ID and Proof-of-Identity Automation
Technology advancements, like Artificial Intelligence (AI), are enabling state agencies to automate like never before. Challenges such as augmenting human review of incoming documents, handling the transition to REAL ID, and preventing fraud must be considered when deciding which technologies to utilize. This webinar series will ensure that you are aware of the latest options to tackle your agency's document demand.Join us for this webinar, wh...
Cohesion out of Chaos: Understanding th...
In late January, a National Security Memorandum was signed to improve the cybersecurity of National Security as required by the Executive Order, 14028. This highlighted the need to increase the sharing of information regarding threats, incidents, and risks across agencies to enable a more effective defense. This memorandum requires the need to develop a framework to coordinate and collaborate on cybersecurity and incident response activities....
Solving Public Sector Health Challenges...
H2O.ai is helping government agencies with getting artificial intelligence capabilities into the hands of operators and analysts that will enable them to achieve mission outcomes faster, better, and smarter. Our tools empower data scientist teams to develop machine learning models quickly, accurately, and responsibly and then make those capabilities available to their own organizations. Join us for this webinar and learn how government agenci...
Meeting the Requirements of the Preside...
President Biden recently signed Executive Order 14028 - "Improving the Nation's Cybersecurity" mandating cybersecurity improvements across the Department of Defense and the intelligence community. With the goal of modernizing cybersecurity defenses and protecting federal networks, this new mandate gives identity teams an aggressive timeline for delivering Zero Trust Architecture and other key initiatives. Join Radiant Logic on Thursday, March...
The State of the Phishing Landscape
You don't have to look far to find a headline about a recent breach or compromise within any sector but from a public sector, phishing was behind 70% of government breaches. As threat actors continue to innovate their approach to lure unsuspecting end users with clever, relevant, and timely phishing attacks, and this is showing no signs of stopping. Every corner of the public sector, whether it be education, federal, state, and local agencies...
Strong Security Starts with Strong IT O...
Splunk ITSI is a premium analytics solution that correlates and applies machine learning to infrastructure, application, and business data for 360° service monitoring, predictive analytics, and streamlined incident management. Unlike point event management or IT monitoring solutions, ITSI correlates and applies machine learning to metric, log, and trace data for end-to-end intelligence across your entire environment. ITSI also combines vie...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.