The Hidden Dangers of Legacy PAM: Why Y...
Attendees joined Keeper Security on January 14th to explore how government organizations can navigate the complex, ever-expanding threat landscape and overcome challenges introduced by remote work and multi-cloud environments. Keeper explained how to gain practical strategies to protect both human and machine infrastructures effectively with a zero-trust approach. During this webinar, attendees were able to learn about:How to address the zero...
IPv6 Workshop Series: Achieving IPv6-On...
In this workshop session, the final of our three-part IPv6 series, HexaBuild’s Scott Hogg provided an overview on how DNS64 and NAT64 can be used to facilitate IPv6-only end-nodes reaching IPv4-only services. Along with Infoblox’s Cricket Liu, they reviewed the architectural considerations for this solution and how to configure the DNS64 functionality in Infoblox. Key Learning Objectives:Discuss how the DNS64 address synthesis is p...
Shielding Public Agencies: Proactively...
HCL Software hosted a webinar exploring how HCL AppScan helps public agencies stay ahead of cybersecurity threats. As cyberattacks grow more sophisticated, ensuring your applications are secure is more critical than ever.
SMS in Public Safety: Navigating the Ch...
Using Short Message Service (SMS) for public safety-grade communication can significantly improve an agency's operations, but to be effective, it must be implemented correctly—a task that isn't simple. HipLink and Carahsoft featuring Amazon Web Services (AWS) collaborated on a webinar where they explored the challenges and opportunities associated with using SMS in public safety. Download the 30-minute webinar now.
Black Duck Takes Flight
On January 22nd, Black Duck Software hosted a live discussion exploring how to secure public sector applications.Attendees learned about:What’s new for the public sector at Black DuckHow Black Duck's portfolio supports a risk-based approach to securityTactics to minimize costs across the software development life cycle
Dell Technologies Webinar Series 2024-2025
In this Dell Technologies Webinar Series, attendees learned about:AI & Generative AIEdge & 5GCyber Security & Data ProtectionMerging Legacy Virtualization & Cloud Native DevelopmentMission Critical InfrastructureCapturing Workloads & Building IT Solutions
Beyond Dashboards: Achieving Predictive...
Move past static dashboards and create data-driven solutions that can anticipate future trends. This session covered how Alteryx enables users to apply predictive analytics that are easy to visualize in Tableau. Ideal for those looking to forecast trends, model scenarios, and derive proactive insights. View this on-demand recording to learn:How low to no-code tools can democratize the use of predictive analyticsTechniques for seamless data han...
Rebuilding Community Trust: Modernizing...
Whether you are a local health department director, epidemiologist, IT leader, or public health professional, this webinar will provide actionable insights to help your organization modernize and rebuild trust through Salesforce-powered public health service delivery. Join us as we explore the transformative potential of CRM technology in restoring community faith in local public health. During this webinar, attendees:Explored how Salesforce c...
Empowering Government Agencies to Deliv...
This webinar highlighted how Copado streamlines deployment, boosts collaboration, and automates testing to help government agencies deliver high-quality applications more efficiently.Key Topics Covered:Common challenges in Salesforce Public Sector Solutions and how to solve themHow Copado simplifies development and reduces manual workAutomated testing strategies that speed up delivery and improve qualityWays Copado saves time and money for age...
Strengthening Defenses: Counter Nation-...
Watch the on-demand webinar with Dragos and Xage Security, where we explored defending against sophisticated nation-state threats to critical infrastructure, including Volt Typhoon. Attendees discovered different strategies for detecting and countering advanced cyber adversaries in OT and IT-OT environments. We covered real-time threat detection, incident response, Zero Trust security and unified defense strategies, combining Dragos' threat in...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.