Automating Employee Workflows to Maximi...
As the federal workforce evolves, so do the expectations of its employees. Government agencies continue to invest in digital transformation and new technologies, and it's increasingly critical to unify employee experiences across systems to ensure the workforce remains productive, engaged, and focused on mission. By consolidating cross-departmental employee experiences into a one-stop-shop portal and delivering a single-pane-of-glass view into...
Effectively Manage User Access for Priv...
Identity governance solutions help IT teams answer “who has access to what?” The integrated BeyondTrust and SailPoint solution allows organizations to answer “is that access appropriate for privileged users?” and “is that privileged access being used appropriately?” Attendees joined BeyondTrust for a live product demo to understand how BeyondTrust and SailPoint integrated to: Automate Access: Increase produc...
Google Cloud Canada EDU Apigee Webinar
During this webinar, attendees learned how: Service New South Wales provides an easy one-stop-shop app for all of its services to over 5 Million citizens with 6 Million API interactions per month and 97% citizen approval. Harvard University and UCLA embrace Apigee as their digital platform for cross campus collaboration. Apigee can securely share government or student data and services creating a more efficient organization & partner ecosy...
Introduction to Advanced Analytics with...
View an interactive Alteryx session on conducting end-to-end analysis. To start off, they unpacked how federal, state, and local agencies are utilizing data driven approaches to enhance their operations, including reconciliation, risk assessment, and data deduplication. After a brief introduction to the possibilities, they went hands-on and learn how to apply these techniques. You will learn how to bring in and merge different sources of data...
Design & Implementation of Zero Trust A...
The Castle and Moat doctrine for IT information security is officially dead, and Zero Trust Architecture (ZTA) is the new method for securing information resources. Zero trust provides an approach to identity and access management that assumes no user or software is trusted by default. All users, devices, and applications must prove their identity and level of authentication before accessing resources. Key thoughts on this approach are never t...
Engaging the Public with Zoom for Government
As governance plans evolve, engaging the public has never been more vital. Government digital services are leveraging new modes of hybrid communication to reach the public, including media, events, and webinars. Whether hosting city council meetings & town halls, conducting virtual hearings, or convening healthcare briefings, Zoom for Government (ZfG) is the platform for today’s government communications. In this webinar, attendees d...
Siren 13: High Fidelity Reports, 2x Sea...
The Siren 13 platform is now twice as fast with a simplified interface to allow for a better analyst experience. This improved search speed along with advanced features such as category icons will provide an overall better analyst experience with better intelligence products. Watch the on-demand webinar where we demonstrate the Siren 13 platform's new features and how they can improve the user experience (UX) of investigators. Investigators no...
Breaking Free from the Technical Debt Trap
Technical debt is an accumulation of inefficiencies and vulnerabilities due to the way in which solutions and technologies are assembled to address specific problems in a "good enough" manner. Technical debt is a reality in all IT environments and often requires significant resources to address. It will often create more debt as security gaps are plugged in an acceptable, but suboptimal way. One of the largest sources of technical debt is Poin...
Building a Healthy Agency with Well-Bei...
We spend most of our waking lives at work; our roles as community servants are more demanding, reactive, and challenging than we’ve experienced before. Research shows that when we bring our whole selves to work, we’re more creative and perform better. In order for employees to thrive, leaders must provide a transformative and engaging experience for their employees. That's a tall order to fill, but there are ways to leverage scienc...
Tackling the Zero Trust Challenge with...
View this on-demand recording to discover what attendees learned during our Zero Trust webinar, topics including: Why Zero Trust security is important for Critical Infrastructure How to communicate the value of Zero Trust in OT to key business decision makers A simple and scalable methodology for analyzing and planning Zero Trust protection Tools to implement Zero Trust controls in OT brownfields and converged IT/OT environments How Zero Trust...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.