Back to Search Begin New Search Save Search Auto-Notify
Mastering DoDD 8140.03M: A Deeper Dive...
In this informative session, our experts guided you through the key aspects of the directive and helped you navigate the path to compliance. By attending this webinar, you learned about: Qualification Matrix Residential Qualifications Privileged User qualifications and tracking (including SAAR/DD2875 forms) Incorporate Proficiency Level Handling Contractors Register to view this on-demand recording.
Add Favorite
Using the Mainframe as an Accelerator t...
In this webinar attendees learned how change is accelerating across economic, environmental, and other social factors, creating complex challenges for governments around the globe. Attendees also learned how their mainframe can play a critical role in their agency’s digital transformation when they use existing mainframe investments within a hybrid cloud strategy to drive innovation and agility. In this on-demand webinar attendees learne...
Add Favorite
Introduction to Feature Flag Management...
Deploying new applications and software updates is a risky operation for federal agencies that can leave developers scrambling to resolve issues. Feature flag management addresses many of the issues federal agencies face in the development cycle. It can enable greater developer productivity, speed up the development cycle and reduce the risk associated with deployments using continuous integration and continuous deployment (CI/CD) practices....
Add Favorite
Scalable, Simple, and Secure Data Resilience
Public sector data and the sensitivity to protect the information they store make these organizations targets for increased ransomware attacks and other cyber threats while managing complex requirements with reduced budgets and resources. Cohesity relieves government and education IT staff by simplifying the management of data and apps. Unlock how to securely get a single and scalable web-scale platform for backup and recovery, files, objects,...
Add Favorite
Hunting the Next Big Cyber Threat: A Da...
Recorded Future is the world’s largest commercial collector of real-time threat intelligence, analyzing intelligence from around 1 million distinct sources on the open and dark web. Join Laura Taylor, a Solutions Engineer, as she discussed how Cyber Threat Intelligence (CTI) teams can use Recorded Future’s powerful analysis to hunt down the next big cyber threat. The on-demand webinar included an overview of: Recorded Future...
Add Favorite
Streamline Digital Document Processes w...
In today’s remote world, Adobe supports government agencies in delivering the best possible document signing experiences by replacing physical signatures with electronic signatures. As the public sector advances to 100% paperless processes, in efforts to meet digital transformation initiatives, Adobe Acrobat Sign is empowering users to deliver fast, legal, and secure services while cutting costs associated with manual, paper-based proces...
Add Favorite
Streamline Digital Document Processes w...
In today’s remote world, Adobe supports government agencies in delivering the best possible document signing experiences by replacing physical signatures with electronic signatures. As the public sector advances to 100% paperless processes, in efforts to meet digital transformation initiatives, Adobe Acrobat Sign is empowering users to deliver fast, legal, and secure services while cutting costs associated with manual, paper-based proces...
Add Favorite
Data Movement Across All Environments
Discover use cases in which Cloudera DataFlow (CDF) and Cloudera Data Platform (CDP)'s data in motion tools are being utilized by Department of Defense agencies to provide access to all observable data in real time and contextualize it with industry data for more informed decision-making with maximum efficiency and agility. Join us for a deep dive into Cloudera's data in motion features and how they leverage Apache NiFi to: Provide a m...
Add Favorite
Zero Trust & SecOps Automation: The Fut...
Department of Defense (DoD) agencies are taking concrete steps to transition to a zero-trust architecture to protect critical data and systems. Transitioning to a zero-trust architecture requires a fundamental reimagining of security operations centers (SOCs) and teams. SOCs have traditionally been structured around the role of the security operator, rather than the data and lacked both automation and DevOps practices. To establish a true zero...
Add Favorite
Salesforce Los Angeles Innovation Day
Attendees joined us on Tuesday, June 20th, for a day of collaboration between Los Angeles agencies, exploring how revolutionary technology platforms easily integrate with current infrastructures- enabling automation, collaboration, mobile, and rapid response to change! Thank you to our sponsors: Box, Tanium, AWS, Cloud Creations, Deloitte, Slalom, Publicis Sapient, AST, Launchpad, StackNexus, and Accenture. Register to view this on-demand reco...
Add Favorite
Back to Search Begin New Search