Beyond VPNs: Identity-First Zero Trust...
In this webinar, attendees:Understand the advantages of Identity-First Zero Trust connectivity over traditional VPNs, IPSec tunnels, SD-WANs, and conventional ZTNA—especially for Non-Human Identity (NHI) and ICAM use casesGain deep insight into Zero Trust principles, identity-centric network overlays, and Secure-by-Design architectureExperience the real-time deployment of Zero Trust Networks-as-a-Service using NetFoundryDiscover key ente...
Automate and Improve Your Cyber Operati...
The Cyber Operational Readiness Assessment (CORA) program evaluates the cybersecurity posture and resiliency of each Authorization Boundary using a broad set of security, risk, and mission data. The problem for Defense and Intelligence Agencies is that they face limitations when trying to combine this data in meaningful, efficient ways that keep them continuously prepared for inspections.In our recent webinar, our Security and Risk Solution Co...
Beyond the LMS: Building a Mission-Read...
Government training leaders across defense, public safety, and civilian sectors face a common challenge: meeting evolving mission demands with limited budgets and leaner teams—without compromising readiness. Access this on-demand webinar to discover how relying on disconnected LMS and training platforms, or point solutions, creates silos, inefficiencies, and security gaps. To truly enhance mission readiness, agencies need a unified train...
How Verkada Can Help Secure K-12
K-12 schools are increasingly adopting Verkada solutions to enhance security, ensure student safety, and reduce vaping incidents. The platform’s simplicity, advanced technology, and focus on privacy make it ideal for addressing the unique challenges of school environments. During this webinar, attendees learned about:Overview of VerkadaCamera capabilitiesVape sensorsGuest accessAccess control
Google Workspace & Dito Hartford Roadshow
This workshop was designed to provide hands-on experience with Google Workspace, explore the possibilities of generative AI, and learn how Google Workspace can enhance your security posture.During this workshop, attendees learned to:Explore Google Workspace tools to boost productivity and collaboration.Learn how Gemini AI can assist in creating videos, creating podcasts based on grounded sources, and can assist in writing and creating material...
Quantum Technologies and the Public Sec...
Quantum technologies are rapidly moving from research labs into real-world applications. For government and public sector IT leaders, gaining a clear understanding of quantum computing, quantum networks, and post-quantum security is essential for making informed strategic decisions. These developments are reshaping the future of data protection, communications and mission-critical systems across the federal enterprise.In this session, Bob Gour...
Photo Editing Made Easy with Beginner W...
Whether you're just getting started or need a refresher, this back-to-basics webinar is designed to help public sector teams confidently manage, edit, and share visual content using Adobe Bridge and Lightroom. These tools are essential for organizing image libraries, improving content quality, and maintaining consistency across digital materials used in outreach, documentation, and internal communications. In this beginner-friendly session, Ad...
Unlocking RESEAs Potential: Scaling Ser...
Watch this insightful on-demand webinar on Missouri’s innovative approach to workforce development through the Reemployment Services and Eligibility Assessment (RESEA) program. In partnership with the Missouri Department of Higher Education and Workforce Development (MDHEWD) and Coursera, the session highlights how the state is using online learning to help individuals receiving unemployment benefits find jobs faster. By enhancing job se...
Secure Your SaaS Data with AppOmni
In this webinar, AppOmni showed how they prioritize the security of data stored in SaaS applications. Attendees discussed how to mitigate the risk of data breach and how the following affects data security:Historic configurations leading to unintended accessComplicated sharing rules lead to data leakageDetecting drift of compliance standards
How HHS Agencies Are Reclaiming Time for Care
Attendees joined Docusign experts on June 18 to learn how innovative HHS agencies are replacing paperwork with digital solutions that prioritize people by reducing backlogs, streamlining collaboration, and delivering faster, more effective care. Key takeaways included: Offer convenient, self-service options through online forms and portal integrationsReach constituents through mobile-first, multi-channel engagementReduce errors and time with a...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.