Unlock the Power of Your CMDB with Ivan...
Unlock the Power of Your CMDB with Ivanti Neurons for ITAMAttendees of this webinar learned:The full lifecycle of your devices from acquisition to disposalHow to monitor software licenses and usageHow to prevent over-licensing and ensuring compliance with vendor agreementsHow to make informed purchasing decisions based on accurate asset data and future needs
5 Zero Trust Confessions: Fireside Chat...
There is no one Zero Trust technology. Effective Zero Trust strategies utilize a mix of existing technologies and approaches, and it does not happen overnight – it is a journey. However, there are some basic principles that can help along the way.Attendees joined CyberArk and Optiv + ClearShark's leaders on December 5th as they shared insights and "confessions" into implementing Zero Trust security principles, emphasizing that it’s...
Meeting Network Analysis & PCAP Requirements
Trellix Network Security won the NAVWAR Cybersecurity Challenge at identifying never-seen-before (“signature-less”) attacks by observing network activity. It also received the Gold Globe Cyber Security Global Excellence Award for Network Detection & Response (NDR).Think of “NDR” as a sibling to “Endpoint Detection & Response (EDR)” working together to detect threats and optimize the response to incid...
Reimagining Digital Efficiency: A Bluep...
Atlassian's System of Work and Agency Implementation can streamline agency operations, improve efficiency and enhance services. In Part 1 on Thursday, December 5th, attendees learned about the core principles of the System of Work, real-world examples and how to apply Atlassian solutions to your specific agency challenges. In Part 2 on Thursday, December 12, learned practical aspects of implementing Atlassian tools including best practices for...
The Low-Down: Network & Cloud Security...
In this Juniper Networks & Carahsoft webinar, we explored the critical aspects of network and cloud security for SLED organizations. Attendees also learned how to design and implement robust security measures to safeguard your sensitive data and systems. In this webinar, attendees heard Juniper SME's discuss:Introduction to Network and Cloud Security: Gain an understanding of the importance of a well-designed security architecture in prote...
Accelerate App Development with GenAI
No-Code/Low-Code application development is continuing to grow and be a critical capability across the U.S. Federal government to help deliver mission impact more quickly and efficiently. What if we could accelerate the impact Low-Code is already making to mission initiatives? ServiceNow Generative AI capabilities do exactly that by streamlining the more complex development processes into easy-to-use interactions. Attendees learned more about...
PeopleSoft Identity Governance: Top 3 B...
In this webinar, attendees learned about:Best Practices for Automating Student Enrollment Processes: Discovered how to automate student enrollment workflows in PeopleSoft to reduce manual effort and eliminate bottlenecks.How to Secure Identities Without Burdening IT Resources: Learned strategies to ensure that identities remain secure during enrollment, role changes, and offboarding, while maintaining operational efficiency.How to Ensure Conti...
Inventory Management with Smartsheet Gov.
Whether it’s armor for the Department of Defense, a fleet of vehicles for a grounds maintenance crew, or pencils and notepads for an administrative office, government agencies need to track, order, monitor, and measure the items, parts, and supplies used daily by their employees. Participants joined James Green, Managing Director of Prime Consulting Group, as he walked through real-world solutions for tracking items by priority, reducing...
Hitchhikers Guide to API Security for A...
Attendees joined F5 and FCN at the Hilton Garden Inn in Dayton, Ohio for a Lunch and Learn discussing API Security.As AI workloads increasingly rely on APIs for seamless integration and functionality, ensuring their security, monitoring, and discovery becomes critical. APIs serve as the backbone for data exchange, model deployment, and real-time decision-making in AI systems. However, this creates unique challenges across the DoD such as safeg...
Zoom at GovExec's CX Virtual Workshop 2024
The NextGov CX Workshop was a resounding success, bringing together top professionals from the public sector to discuss the latest advancements in customer experience (CX). Attendees left inspired with actionable insights to transform how government agencies deliver services.Zoom’s session was a highlight of the day, showcasing their cutting-edge solutions for enhancing CX. The session covered how Zoom’s AI-driven tools, unified co...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.