Back to Search Begin New Search Save Search Auto-Notify
Harnessing Peer-to-Peer Engagement and...
In today's digital-first world, establishing an engaging virtual learning environment is both essential and demanding. It's no longer sufficient to merely reach learners, regardless of their location; trainers must also craft personalized and captivating digital learning content. Leverage hybrid learning to create a unified learning experience with content that’s available in any format across devices, letting users learn anywhere, at an...
January 24, 2024
Organizer: Adobe Government Team at Carahsoft
Location: Webcast
Add Favorite
How Mobile County, Alabama, Implemented...
IT and HR leaders in Mobile County, Alabama recognized their legacy human resources and payroll processes were no longer efficient, and it was time to migrate to an improved system. After evaluating several options, Mobile County chose to move to Workday, a modern human capital management (HCM) system. But there was a problem – the County’s IT team didn’t have the necessary knowledge or experience to support the new tech depl...
January 23, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
Protecting Privacy from the Ground Up
Privacy is an often-overlooked aspect of cybersecurity. With the growth of AI and evolving privacy legislation, however, state and local agencies will need to understand how to select and integrate technologies that not only meet compliance standards but also promote maximum privacy and trust. Overwhelmed with stories of hacks, attacks, and the prying eyes of private companies and public agencies, fatigued defenders may feel that even attempti...
January 19, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
Think Like a Spy to Improve Your Cybers...
State and local governments, K-12 districts, and higher education institutions face two kinds of threats: (1) Trusted Insider threats and (2) ‘Virtual’ Trusted Insider threats. Trusted Insider threats are rogue employees using authorized access to do unauthorized acts. This can include theft of data and services, fraud, or even system destruction or theft of IP and trade secrets. Virtual trusted insider threats happen when an emplo...
January 17, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
2024 Predictions Report: Evolution Is t...
The term ‘evolution’ implies the gradual growth of something from simple to complex, and it perfectly sums up Arctic Wolf’s 2024 Cyber Threat Predictions. The predictions presented are based on current cybersecurity trends and insights gathered from our data, and trace the development of several trends based on their earlier, simpler iterations and anticipate which ones are poised to take significant steps forward in the year...
January 16, 2024
Organizer: FutureCon
Location: Webcast
Add Favorite
How Federal Agencies Can Take the Next...
It’s the age of AI. Artificial intelligence is everywhere, dominating headlines and conversations as AI and machine learning (ML) technologies advance at a rapid pace. Federal spending on AI has risen to record levels, and the Biden administration’s fiscal year 2024 budget seeks billions of dollars more, while AI-related legislation has increased exponentially in Congress. Federal agencies and mission partners are implementing AI-i...
January 9, 2024
Organizer: MeriTalk
Location: Webcast
Add Favorite
Navigating Workforce Complexity for the...
Join us for an enlightening panel discussion with moderator, Justin Doubleday and agency and industry leaders who will explore the strategies and tools aimed at empowering the modern digital-native workforce in the intelligence community. During this exclusive webinar, our expert panel will shed light on the potential solutions to overcome these challenges and foster a workforce equipped for success. Learning objectives: Approach to building t...
December 5, 2023
Organizer: Federal News Network
Location: Webcast
Add Favorite
Understanding FedRAMP Compliance Webinar
Are you familiar with Federal Government programs for protecting controlled unclassified information? There is an increasing emphasis on enforcing the protection of sensitive data by government contractors through cybersecurity compliance programs that require implementation of the Federal Risk and Authorization Management Program (FedRAMP).Companies doing business directly or indirectly with the Department of Defense (DoD) must be aware of th...
November 9, 2023
Organizer: Executive Mosaic LLC
Location: Virtual
Add Favorite
FedRAMP Rev 5 and Beyond: Your Key to S...
Since its launch in 2011, FedRAMP has become the best practice for selecting, deploying, and managing cloud systems and applications in the U.S. Federal Government. And in January 2023, the FedRAMP Authorization Act made FedRAMP the law of the land! Now, Rev 5 of FedRAMP brings unprecedented levels of automation and continuous monitoring to this industry leading approach enabling faster submissions and authorizations. The key to these new leve...
November 9, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Amplifying Federal Efficiency with AI-P...
The federal government expends significant resources on manual data processing and entry, which is not only time-consuming but also error prone. Technological advancements now empower agencies to streamline data processing and extract valuable insights from their document repositories, enhancing efficiency and accuracy. Join Digital Government Institute (DGI), Hyland and Amazon Web Services for a webinar exploring the application, benefits, an...
November 7, 2023
Organizer: Digital Government Institute
Location: Webcast
Add Favorite
Back to Search Begin New Search