Cloud Public Safety & Emergency Managem...
Data analytics demonstrate their value for both public safety and emergency management every day. The National League of Cities, for example, promotes the usefulness of Data-Informed Community Engagement (DICE), pairing crime data and analytics with community-driven risk concerns. Data-driven policing has been in use since the 1970s, but the advent of the cloud and edge computing has put it at the fingertips of law enforcement. Similarly, emer...
July 22, 2025
Organizer:
FedInsider Location:
Webcast
Google Defense Roadshow: AI Mission Advantage
How can defense agencies strengthen resilience, security, and integrate AI in our rapidly evolving digital landscape? The Google Defense Roadshow in Colorado Springs brings together mission-focused leaders to explore how defense organizations can harness the full power of cloud, edge, and AI to stay ahead in our high-stakes environment. Today’s defense operations demand secure, always-on access to data, whether in the cloud, at the edge,...
July 22, 2025
Organizer:
GovExec 360 Location:
Colorado Springs, CO
Identifying Hidden Cracks: Strengthenin...
Gartner presented the SOC Visibility Triad of capabilities (EDR, NDR and SIEM) as foundational capabilities for a SOC team to acquire to be as effective as possible; however, there are hidden assumptions baked into the SOC Visibility Triad that resulted in deployments being vulnerable and sitting on cracked foundations. Additionally, as technology has evolved, asset management solutions need to be capable of helping teams not only identify ass...
Stopping Credential-Based Attacks and L...
Phishing-resistant access is now a mandate, not a nice-to-have. But most federal authentication workflows still rely on passwords or other shared secrets that attackers can easily exploit. These compromises often become the entry point for lateral movement inside networks, escalating the impact of a breach. Join this webinar to learn how Beyond Identity helps agencies strengthen both device and identity assurance without introducing user frict...
Securing Government Systems at Scale: H...
Government agencies at every level—federal, state, and local—face mounting cybersecurity challenges: increasingly sophisticated threats, evolving compliance mandates, limited IT resources, and ongoing pressure to ensure the continuity of public services. Join Cimcor for this timely and informative webinar to explore how CimTrak empowers government entities to take control of their IT environments and respond swiftly to unexpected o...
AI-Powered Log Management
Drowning in log data and stuck in reactive mode? It's time to transform your organization's log management with AI-powered automation and step into the future of proactive IT. Join our upcoming webinar to discover how Dynatrace is revolutionizing log management with an AI-powered approach. With features like the Log Distribution Dashboard, Dynatrace OneAgent and Dynatrace Query Language (DQL), you gain unprecedented visibility and control over...
Revolutionizing Government with Google'...
Join Carahsoft, Google Public Sector, and Knexus for your opportunity to discover the groundbreaking advancements made with Generative AI in the public sector. A year after launching the GenAI Revolution with Knexus and our government partners, we're ready to share the latest tangible successes. This webinar is more than a lookback; it offers a direct view into the transformative power of AI in government technology. We'll showcase three cutti...
How Booz Allen Leveraged Deltek and RPA...
How Booz Allen Leveraged Deltek and RPA to Increase Efficiency, Accuracy, and Timeliness in Their Billing Process Join us for an insightful webinar showcasing how Booz Allen, a large, advanced technology company, combined their vision with Deltek Costpoint, the power of UiPath's RPA, and Baker Tilly's expertise to deliver measurable improvements and efficiencies in customer billing operations. Discover how Booz Allen partnered to apply best in...
AI Auto-Remediation: Department of Ener...
AI-enabled software automation significantly improves operations and management of critical systems that are integral to research and development, like those within the Department of Energy complex. The integration between Dynatrace and Red Hat Ansible enables the collection and analysis of data and metrics in real-time, yielding deep insights into system performance, areas for experience enhancement and auto-remediation of problems identified...
Mobile Device Investigator Training
ADF Solutions invites you to a free, hands-on training session for Mobile Device Investigator� (MDI)—our field-proven mobile forensics tool trusted by investigators nationwide. Attendees will earn an MDI User Certificate + FREE 6-month license upon completion of training! We are pleased to be offering the training live in Reston, VA! Join our expert instructors for a full day of live, interactive training where you'll gain the skills to...
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.