Back to Search Begin New Search Save Search Auto-Notify
Enabling Remote Government Access ...
Previously an occasional event, the COVID-19 pandemic makes remote work the new normal and government agencies are evolving how and where employees will work. As agencies evaluate how to work effectively, certain roles are moving to permanent remote work while a hybrid strategy is deployed to others. This new way of working opens organizations to new talent as well as new security challenges. This webinar teaches your agency how to securely en...
Add Favorite
Lessons States Learned from COVID-19: A...
How are states leveraging technology to adopt the new COVID era? State and Federal governments have needed to embrace a new way of doing business, with emerging technologies like AI and Machine Learning accelerating approval. Join Yext for a complimentary webinar to learn how state leaders are turning the pandemic into a promising future filled with innovation and creativity. Specifically, this discussion will cover: How technology innovation...
Add Favorite
Zero Trust Is Not One Size Fits All: Wh...
Join experts from Appgate, Tenable, and Carahsoft as we discuss why the government and industry need to implement a dynamic Zero Trust strategy, and strategies to facilitate securing these platforms and data. In this webinar, you will learn about: How Zero Trust fits into IT, OT, and IoT Common use cases for integrating Zero Trust into IT/OT/IoT security Benefits organizations can expect from implementing a comprehensive Zero Trust strategy ac...
Add Favorite
Lessons States Learned from COVID-19: A...
How are states leveraging technology to adopt the new COVID era? State and Federal governments have had to think fast to embrace to a new way of doing business. Emerging technologies like AI and Machine Learning have helped accelerate approval. Join Yext for a complimentary webinar and learn how state leaders are turning the pandemic into a promising future filled with innovation and creativity. Specifically, this discussion will cover: How te...
Add Favorite
ATARC Law Enforcement Summit: Securing...
Federal agencies have been mandated to adopt a zero-trust architecture, Federal leaders must develop a plan to implement a zero-trust architecture, incorporating as appropriate the migration steps that the National Institute of Standards and Technology has laid out. Agency heads need to describe the steps already completed to move to zero trust, identify activities that will have the most immediate security impact and include a schedule to imp...
Add Favorite
Adobe ColdFusion Workshop
Join our complimentary Adobe ColdFusion Workshop to learn how you and your agency can leverage Adobe ColdFusion to create amazing web content. This one-day training will cover all facets of Adobe ColdFusion that developers need to build applications that can run across multiple cloud providers or on premise. Specifically, the workshop will explore: The major features in the latest release of Adobe ColdFusion How to use Adobe ColdFusion Markup...
Add Favorite
Hyperconverged Infrastructure for the M...
Datacenter requirements are evolving and the Navy needs a durable platform that delivers the full power of Hyperconverged Infrastructure (HCI) for workloads in environmentally-challenging locations and/or space-constrained areas. Whether you are deploying a data center at a forward operating base, on a ship/submarine, running real-time GPS mapping on the go, or implementing video surveillance in remote areas, this session will teach you how De...
Add Favorite
Securing Your Environment with Automation
Federal agencies are now required to adopt a Zero Trust architecture and leaders must develop plans to implement the IT tools necessary to meet regulations. Implementing a Zero Trust architecture should strengthen other existing security practices and tools, it doesn't require a massive acquisition of new technologies.Red Hat has the resources to help you understand current threat environments and why security automation practices are necessar...
Add Favorite
A Cybersecurity Playbook on Maximizing...
In this webinar, featured speakers Fernando Maymi, Dr. Michael Ehrlich, and Maria Thompson will give public sector stakeholders a playbook on securing cloud environments, enabling anonymous threat information-sharing across the public and private sectors, and ways to meet the objectives of the Biden EO on "Improving the Nation's Cybersecurity." You will also learn the importance of removing barriers to sharing threat information and developing...
Add Favorite
AI/ML Learning Workshop: Trusted AI
AI mimics human cognitive functions while machine learning is a component of AI, which involves the training of algorithms or models that then give predictions about data it has yet to observe. AI/ML and Robotic Process Automation (RPA) are meant to augment humans in the workforce, not merely replace people with autonomous robots or chatbots. To be effective, federal agencies must strategically organize around the right people, processes, and...
Add Favorite
Back to Search Begin New Search