Back to Search Begin New Search Save Search Auto-Notify
Buying Software That Delivers: Strategi...
Attendees joined this expert-led webinar with Carahsoft and Clearwater for a behind-the-scenes look at the proven playbook for selecting and implementing enterprise software that delivers real, measurable value. They heard firsthand from those who’ve helped organizations across sectors cut through complexity, secure buy-in, and deploy solutions that drive lasting impact. During this webinar, attendees learned how to:Navigate procurement...
Add Favorite
Mission Assurance is Software Assurance
Thank you for your interest in our mission-focused webinar on software assurance and secure delivery.The Department of Defense is doubling down on requirements for SBOM generation, ATO and SWFT, pushing teams to meet higher standards for securing mission-critical systems. Many legacy tools are falling short—offering limited automation, visibility and compliance support.During the webinar, cybersecurity leaders from ReversingLabs shared h...
Add Favorite
Securing Federal Access: Identity Secur...
As government agencies continue to modernize their IT infrastructure and align with executive mandates for Zero Trust Architecture (ZTA), identity security becomes a critical pillar for cyber resilience. This webinar, hosted by BeyondTrust and Optiv + ClearShark, explored how government agencies can formalize and accelerate their zero trust implementation with Identity Security Insights that illuminate exposures in their identity security post...
Add Favorite
The Future Belongs to Learners Series:...
Attendees learned how a ChatGPT Agent executes multi-step tasks, integrates with connectors and turns natural-language instructions into automated outputs. This session breaks down core functions, government-relevant use cases and the security and admin controls that govern the feature.Attendees Gained:A clear understanding of ChatGPT Agent’s core functions and differentiatorsGuidance on governance, permissions, and admin controlsExample...
Add Favorite
It's Not the Breach. It's the Spread: I...
This session explored the critical role of cyber resiliency in helping organizations withstand and recover from today's evolving threats. We dove into strategies for reducing attack surfaces, visualizing networks, and securing critical IT assets while also examining how compliance regulations can enhance security and safeguard sensitive data. During this webinar, attendees:Learn how to minimize vulnerabilitiesGain actionable insights to streng...
Add Favorite
One Portal, Many Missions: Simplifying...
In this webinar, attendees learned how Jira Service Management helps federal agencies overcome the challenges of multiple portals, complex workflows and manual processes that slow response times and drive up costs.The session explored how to:Consolidate service requests into a single, user-friendly portalAutomate routing and reduce manual processesStrengthen compliance while cutting costsEmpower teams to focus on mission success instead of adm...
Add Favorite
Five Unhealthy Mistakes to Avoid When A...
Topics covered in this webinar:Neglecting a Formal Archiving StrategyMerging Patient DataCreating Mini EHRsStaying Loyal to your Original LDA VendorArchiving With the Incumbent EHR
Add Favorite
Spot the Phish! Email Security with Splunk
Learn how Splunk Attack Analyzer empowers SLED IT teams to quickly identify phishing threats and automate response actions, reducing manual effort and improving security outcomes. In this webinar, attendees learned:Understand why phishing attacks are increasingly complex and manual analysis is unsustainableLearn how Splunk Attack Analyzer automates threat analysis to save analysts timeSee real-world results showing better detection accuracy an...
Add Favorite
The Future Belongs to Learners Series:...
Take your ChatGPT skills to the next level. In this session, participants learned how to use advanced tools - Deep Research, Projects, Data Analysis, Canvas, Connectors, and ChatGPT Agent - to move from simple prompting to structured, repeatable workflows. OpenAI demonstrated how these capabilities helped government teams collaborate, analyze data, and deliver results more efficiently while maintaining enterprise security and compliance.What P...
Add Favorite
Unlock the Power of OpenShift Virtualiz...
Carahsoft and Red Hat hosted an interactive virtual training that empowered IT teams to modernize operations and strengthen OpenShift skills. With growing demands for agility and efficiency, this hands-on session allowed participants to gain real experience in a live sandbox environment while learning best practices from Red Hat certified instructors.This training helped attendees:Build technical confidence through guided exercisesStreamline w...
Add Favorite
Back to Search Begin New Search