Preparing for Success with Tableau Cloud
Thank you for your interest in our Information Lab webinar! This webinar was designed to help you unlock the full potential of Tableau Cloud. Whether you were transitioning from Tableau Server or getting started with Tableau Cloud for the first time, this session provided essential insights and practical guidance. Key Takeaways:Understand the Differences: Gain clarity on the key distinctions between Tableau Server and Tableau Cloud to choose t...
Is Continuous Threat Exposure Managemen...
In today's dynamic threat landscape, organizations, especially within the State, Local and Education sectors, face the challenge of enhancing their cybersecurity posture without overhauling existing systems.Gartner's Continuous Threat Exposure Management (CTEM) framework offers a strategic approach to continuously refine and optimize security measures.During this webinar, attendees learned:How to implement Gartner's CTEM framework without over...
F5 API Security & Observability Workshop
Attendees joined Peter Scheffler, Sr. Solutions Architect at F5, and Jay Pe�a, Solutions Engineer at F5, for a hands-on interactive workshop focused on API security and cybersecurity best practices. Hosted at the Cyber Bytes Foundation's Quantico Cyber Hub, this workshop provided participants with the opportunity to deepen their knowledge, uncover vulnerabilities, and develop actionable strategies to better protect their APIs. Attendees who jo...
Flexible Grants Management in an Era of...
As the grants landscape continues to evolve, agencies need to strengthen their existing proactive approach with proven strategies for future success. Watch our on-demand webinar to discover practical techniques for building data collection systems that capture both current requirements and anticipate future needs. Dive deep into sophisticated impact measurement techniques that powerfully demonstrate your program's value to stakeholders and str...
Accelerating Discovery with the Power o...
In today's fast-evolving digital landscape, federal scientific agencies must manage hybrid clouds while maintaining security and efficiency—often with limited resources. Manual operations can slow innovation, create inconsistencies and drain critical resources. At this exclusive Red Hat webinar, attendees learned how Red Hat Ansible Automation Platform empowers agencies to automate network operations, enhance security and improve efficie...
F5's AI Gateway: The One-and-Done Solut...
Attendees joined us for an in-depth discussion on how AI architectures are designed. Attendees learned from F5's AI experts on where AI applications are most vulnerable (and why) and how F5’s portfolio of security solutions, including AI Gateway, can help protect those applications. We also dove into how API discovery helps you architect AI applications. Lastly, the MVP will be a demo of F5’s AI Gateway!
Building Tomorrow's Workforce with Sale...
In the webinar, participants discovered how Salesforce’s Talent Recruitment Management is revolutionizing public sector hiring. The session explored how this innovative solution can streamline the entire talent management journey—from workforce planning through retirement—empowering agencies to accelerate hiring, improve the candidate experience, and ensure compliance. What Was Explored:Leverage Salesforce's Talent Recruitmen...
How to Protect Assets in a Connected Wo...
Attendees were joined by Connor Rhodes, Enterprise Solutions Engineer at Verkada, on Thursday, March 27th, as he walked through:Cybersecurity principles for both on-prem and cloud-based systemsHow to safeguard risks that organizations face todayAnd so much more about Verkada's security solutions for state and local government organizations
Leveraging Public Data to Identify FOCI...
Foreign Ownership, Control, or Influence (FOCI) poses a growing risk to US government contractors, especially amid increasing investment from various governments, specifically China, into foreign companies. Understanding these vulnerabilities is crucial to preserving US and allies' national security.Listen to our expert speakers as they demonstrate how to detect FOCI risks by analyzing ownership structures, supply chain exposure, and dual-use...
Cyber Resilience at the Crossroads
Cyber threats against U.S. infrastructure and the defense industrial base (DIB) are increasing at an alarming rate. Attacks from nation-state actors are compromising supply chains, contractors, and small-to-medium businesses at unprecedented levels. The White House’s NSM-22 directive underscores the urgency of securing critical infrastructure—but many organizations remain vulnerable. Topics discussed during this event include:How n...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.