Back to Search Begin New Search Save Search Auto-Notify
Compliance Training for Government
Compliance is a mission-critical requirement of your organization, but it can be difficult to scale, hard to conduct, and tricky to ensure your entire workforce is partaking. When tasked with training your entire organization, you must use a learning management system that helps you to manage compliance training. Join this complimentary webinar to learn how your organization can: Track manual processes and make them automatic, allowing you to...
Add Favorite
Enabling Remote Government Access ...
Previously an occasional event, the COVID-19 pandemic makes remote work the new normal and government agencies are evolving how and where employees will work. As agencies evaluate how to work effectively, certain roles are moving to permanent remote work while a hybrid strategy is deployed to others. This new way of working opens organizations to new talent as well as new security challenges. This webinar teaches your agency how to securely en...
Add Favorite
Lessons States Learned from COVID-19: A...
How are states leveraging technology to adopt the new COVID era? State and Federal governments have needed to embrace a new way of doing business, with emerging technologies like AI and Machine Learning accelerating approval. Join Yext for a complimentary webinar to learn how state leaders are turning the pandemic into a promising future filled with innovation and creativity. Specifically, this discussion will cover: How technology innovation...
Add Favorite
Zero Trust Is Not One Size Fits All: Wh...
Join experts from Appgate, Tenable, and Carahsoft as we discuss why the government and industry need to implement a dynamic Zero Trust strategy, and strategies to facilitate securing these platforms and data. In this webinar, you will learn about: How Zero Trust fits into IT, OT, and IoT Common use cases for integrating Zero Trust into IT/OT/IoT security Benefits organizations can expect from implementing a comprehensive Zero Trust strategy ac...
Add Favorite
Lessons States Learned from COVID-19: A...
How are states leveraging technology to adopt the new COVID era? State and Federal governments have had to think fast to embrace to a new way of doing business. Emerging technologies like AI and Machine Learning have helped accelerate approval. Join Yext for a complimentary webinar and learn how state leaders are turning the pandemic into a promising future filled with innovation and creativity. Specifically, this discussion will cover: How te...
Add Favorite
ATARC Law Enforcement Summit: Securing...
Federal agencies have been mandated to adopt a zero-trust architecture, Federal leaders must develop a plan to implement a zero-trust architecture, incorporating as appropriate the migration steps that the National Institute of Standards and Technology has laid out. Agency heads need to describe the steps already completed to move to zero trust, identify activities that will have the most immediate security impact and include a schedule to imp...
Add Favorite
Adobe ColdFusion Workshop
Join our complimentary Adobe ColdFusion Workshop to learn how you and your agency can leverage Adobe ColdFusion to create amazing web content. This one-day training will cover all facets of Adobe ColdFusion that developers need to build applications that can run across multiple cloud providers or on premise. Specifically, the workshop will explore: The major features in the latest release of Adobe ColdFusion How to use Adobe ColdFusion Markup...
Add Favorite
Hyperconverged Infrastructure for the M...
Datacenter requirements are evolving and the Navy needs a durable platform that delivers the full power of Hyperconverged Infrastructure (HCI) for workloads in environmentally-challenging locations and/or space-constrained areas. Whether you are deploying a data center at a forward operating base, on a ship/submarine, running real-time GPS mapping on the go, or implementing video surveillance in remote areas, this session will teach you how De...
Add Favorite
Securing Your Environment with Automation
Federal agencies are now required to adopt a Zero Trust architecture and leaders must develop plans to implement the IT tools necessary to meet regulations. Implementing a Zero Trust architecture should strengthen other existing security practices and tools, it doesn't require a massive acquisition of new technologies.Red Hat has the resources to help you understand current threat environments and why security automation practices are necessar...
Add Favorite
A Cybersecurity Playbook on Maximizing...
In this webinar, featured speakers Fernando Maymi, Dr. Michael Ehrlich, and Maria Thompson will give public sector stakeholders a playbook on securing cloud environments, enabling anonymous threat information-sharing across the public and private sectors, and ways to meet the objectives of the Biden EO on "Improving the Nation's Cybersecurity." You will also learn the importance of removing barriers to sharing threat information and developing...
Add Favorite
Back to Search Begin New Search