The Circle of Viz: Content Promotion Li...
Discover strategies for managing projects, user groups and content permissions to effectively promote and distribute content across your Tableau environment. Learn how to streamline Tableau content management, simplify processes and boost work efficiency. During this webinar, attendees learned:The Key Metrics of Success: Develop a plan and set measures to gauge the success of Tableau content promotion efforts.Site and Project Architecture: Div...
Operationalizing Zero Trust: NIST and B...
Over 15 years since its initial conception and more than three years since the U.S. federal government made it a fundamental tenet of its overall cybersecurity strategy, Zero Trust has only become more important as a strategic framework for government and critical infrastructure alike. While the imperative to implement Zero Trust has been well established, the question of “how” is less clear. Enter NIST and the National Cybersecuri...
How to Engage with CIOs
In this exclusive partner webinar, Ted Brodheim, former CIO and current Global CIO Advisor at Zoom Communications, shared his expert perspective on successfully engaging with Chief Information Officers (CIOs).In this session, Ted provided Zoom resale partners with a deeper understanding of what CIOs prioritize when purchasing technology, how they navigate the buying process, and how to foster strong relationships with these key decision-makers...
HHS IT Simplified: Why Automation Matte...
Red Hat and Carahsoft hosted an HHS exclusive webinar on February 12th on a technical overview of Red Hat Ansible Automation Platform. This session explored:Key features and capabilities of Ansible tailored for HHS needsBest practices for scalable IT automationThe latest updates and enhancements in Ansible Automation Platform
Use Cases in Threat Intelligence: Turni...
Attendees gained essential insights on modern cyber threats with experts from Google Public Sector and August Schell. The session explored the latest trends and emerging threats targeting U.S. Navy operations, aimed at strengthening cybersecurity and enhancing maritime security. Highlights included:A detailed overview of the current cyber threat intelligence and emerging trends targeting the U.S. public sector.Insights from Mandiant's latest t...
Beyond the Generative AI Hype: Practica...
Experts shared insights on how Generative AI had been a transformative technology capable of revolutionizing public sector services by enabling AI agents to:Simplify communication by understanding everyday language.Converse with residents in their preferred language.Gather complete information through straightforward questions, reducing delays.Recommend relevant services for review and approval.Autocomplete paperwork using existing documents.H...
PQC Migration: Where Are We Now?
Recent announcements from the likes of NIST, Gartner, and Google have highlighted the importance of post-quantum cryptography. These announcements have increased the sense of urgency for PQC migration. Given that PQC migration is a long-term and resource-intensive task, many are asking where the cryptography industry stands at this point. They want to know how they should be managing their PQC migrations, what kinds of tools they will need to...
AI and Automation in Action: Transformi...
Dynatrace and Red Hat hosted an NIH and CMS exclusive webinar on February 18th, tailored specifically for government leaders in the healthcare sector. This session explored how AI and automation drive transformative for NIH and CMS.During this session, attendees:Learn how AI-driven automation can optimize event-driven systems to enhance operational efficiency and patient care.Discover practical insights on streamlining IT infrastructure and wo...
Next-Gen SOC at the Forefront
Recently, SOC Prime and Carahsoft hosted an exclusive webinar on the future of cybersecurity operations centers (SOCs). Participants discovered how next-gen SOCs empowered enterprise and MDR-focused organizations to stay ahead of evolving threats and minimize the risk of breaches by harnessing the power of cutting-edge technology, advanced automation, and community-driven threat intelligence.
Empowering AI Success: Building a Futur...
Attendees of this webinar learned about how integrating AI into the U.S. Department of Defense (DoD) and Intelligence Community (IC) is crucial to ensuring that the U.S. maintains its competitive advantage in an increasingly complex and data-driven world—driven by global competition for technological superiority. Artificial intelligence (AI) offers incredible potential to advance decision advantage and a variety of key mission areas. How...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.