Back to Search Begin New Search Save Search Auto-Notify
Zero Trust Best Practices for Federal A...
In today's rapidly evolving cybersecurity landscape, federal agencies face increasing pressure to implement Zero Trust Architecture (ZTA) to safeguard critical assets, streamline access controls, and meet stringent compliance requirements. The Cybersecurity and Infrastructure Security Agency (CISA) has outlined a clear roadmap through their Zero Trust Maturity Model (ZTM), enabling agencies to move from traditional security approaches to a mor...
Add Favorite
Digital Government in Action: Designed...
Government agencies are under pressure to deliver smarter, faster, and more trusted digital services while reducing costs. At the same time, constituents expect easy-to-access, reliable services.Watch our five-part Adobe webinar series to learn how your agency can modernize public services, digitize internal workflows, and accelerate content delivery, while ensuring compliance and protecting sensitive data. Specifically, attendees learned how...
Add Favorite
Hyland Public Sector Innovation Forum
State and local governments and higher education institutions manage massive amounts of data every day—requiring smarter, faster solutions to stay ahead. Now, more agencies and institutions are putting their unstructured data to work to drive faster business processes and decision-making. Attendees joined Hyland in Farmington, UT, for our Public Sector Innovation Forum and explored how Hyland is helping public institutions modernize, aut...
Add Favorite
The Future of Public Safety Drones: DFR...
Experts from Nokia and Carahsoft discussed the evolution of Drone as First Responder (DFR) 2.0, highlighting how emerging technologies and next-generation networks are enhancing situational awareness and mission outcomes in public safety.
Add Favorite
Real-Time Insights From 911 Call Data:...
Cloudera, in collaboration with AWS, explores how public safety agencies can harness the power of real-time, data-centric solutions to improve emergency response and community safety. This webinar demonstrates how technologies like Apache Nifi, Kaika and Apache Iceberg work together to stream, structure and analyze 911 call center data at scale.Attendees explored how geo-powered analytics and scalable cloud infrastructure equip agencies to:Mon...
Add Favorite
F5 ADC 3.0: Revolutionizing Application...
F5 Tech on Tap is back for 2025! F5, Red Hat, and Peraton hosted an interactive session highlighting how F5 ADC 3.0, F5 AI Gateway, and Red Hat technologies provide the tools you need to maintain resilience across an increasingly complex and expanding threat landscape.Attendees learned how our solutions can:Combat Emerging AI Threats: Discover the F5 AI Gateway, a cutting-edge solution providing real-time resilience against emerging cyber risk...
Add Favorite
Accelerating Responsible AI Adoption: E...
On August 5, DynamoAI and Carahsoft held a webinar titled 'Accelerating Responsible AI Adoption'. The webinar focused on the latest White House directive on Federal use of AI: agencies are rapidly integrating effective and low-cost AI test, evaluation, and guard rail technologies into their AI adoption strategies. Trusted by global organizations like Qualcomm, Intel and Experian, Dynamo AI provides security and compliance controls that span th...
Add Favorite
Fortinet Security Fabric: Fortifying Ne...
This webinar discussed the E-Rate eligible solutions of the Fortinet Security Fabric. Through a demonstration of available category 1 and category 2 E-rate eligible solutions, attendees learned how Fortinet can help their education organization achieve advanced, scalable cybersecurity for their schools.School IT departments face many challenges in keeping students, faculty and staff safe from cyber threats, like limited funding, while also mai...
Add Favorite
Navigating ITAR: Strategies for Seamles...
In today's information age, the seamless sharing of all types of data between the U.S. and its allies is crucial for advancing our joint sovereign goals and military objectives. However, controlling the flow and access to massive amounts of data presents a daunting challenge. This challenge is compounded by ITAR's (International Traffic in Arms Regulations) stringent security and access control mandates, which carry severe penalties for non-co...
Add Favorite
AI-Driven Adversaries & Autonomous Deci...
As space becomes an increasingly contested domain, static simulations and rule-based training can’t keep pace with the evolving threat landscape. Enter Slingshot's autonomous AI agent purpose-built to simulate intelligent adversary behavior, accelerate decision cycles, and deliver operational advantages in real-time orbital scenarios. Check out this on-demand webinar for an inside look at how Slingshot is unlocking next-generation space...
Add Favorite
Back to Search Begin New Search