A Government Framework for Proving Cybe...
Government cybersecurity investments are under greater scrutiny than ever. Agencies must secure mission-critical systems, meet complex compliance requirements and defend against escalating threats while justifying every dollar spent. Yet, traditional ROI models fall short when it comes to measuring the true value of risk reduction and prevention. Watch this webinar to learn more about Return on Mitigation (RoM), a novel framework designed to h...
VMware Army ELA Enablement: Fort Belvoir
VMware and the Program Executive Office (PEO) Enterprise Digital Market hosted a half-day technical session at Fort Belvoir. This in-person event brought together IT professionals, program leads, and decision-makers to share knowledge and practical strategies for modernizing infrastructure and maximizing technology investments. The session provided an overview of the ELA contract’s value, guidance on accessing training resources, and pra...
Secure Access to Generative AI Tools in...
Generative AI tools like ChatGPT have transformed how government organizations access information and enhance productivity. However, their adoption raises critical concerns about safeguarding sensitive data and maintaining compliance. During this insightful webinar, Zscaler demonstrated how to provide your users with access to generative AI tools while ensuring robust data security measures utilizing a Zero Trust framework. From browser isolat...
Tableau Data Modeling Explained: Relati...
This webinar took a practical deep dive into how Tableau handles data modeling—and why mastering it can drastically improve the accuracy, usability, and performance of your dashboards. We demystified how Tableau’s logical and physical data layers work, when to use joins vs. relationships, how unions behave, and what happens behind the scenes when Tableau writes queries. Attendees also saw how tools like Tableau Prep and custom SQL...
Transforming Enterprise IT: Real-Time D...
In this webinar, attendees learned:What multi-cloud enterprise IT management looks like today and the challenges of operating across multiple cloud environmentsWhere the disconnect lies between enterprise needs and the services offered by Cloud Service Providers (CSPs)How database management automation is evolving with SentientDBHow to prepare for the future of IT management with AI, automation, and new applications
Achieving Consistency and Control Acros...
Manual network configurations can't keep pace with modern technical demands. IT automation offers an accelerated, consistent approach across complex environments.This virtual event explored how Red Hat Ansible helps network teams increase agility, reduce human error and improve compliance with end-to-end automation.Attendees learned: Core use cases for network automationHow to automate tasks across routers, switches and firewallsReal-world exa...
Fortinet Security Fabric: Fortifying Ne...
This webinar discussed the E-Rate eligible solutions of the Fortinet Security Fabric. Through a demonstration of available category 1 and category 2 E-rate eligible solutions, attendees learned how Fortinet can help their education organization achieve advanced, scalable cybersecurity for their schools.School IT departments face many challenges in keeping students, faculty and staff safe from cyber threats, like limited funding, while also mai...
AI & Automation in Action: Modernizing...
Artificial intelligence (AI)-enabled software automation significantly enhances the operations and management of critical systems essential to financial oversight, regulatory compliance and data analysis within Federal Financial agencies.Red Hat OpenShift AI and Red Hat Device Edge, combined with Dynatrace’s observability tools, provide robust solutions for and drive automation within these systems, helping to manage AI workloads and edg...
Lessons Learned From 100K Pentests: Com...
This session provided cybersecurity professionals with actionable intelligence on how continuous offensive security principles can transform reactive security programs into proactive defense strategies. Attendees learned evidence-based approaches to combat these systemic issues, including how to validate the effectiveness of existing security investments, implement risk-based prioritization frameworks, and establish continuous validation cycle...
Pixel Perfect Tableau Reporting for NYC...
Want to get rid of your legacy BI solution and fully transition to Tableau for both self-service data visualization and formatted, Pixel Perfect reporting?Learn how to use the Pixel Perfect Tableau extension by USEReady for formatting and reporting in Tableau. From enabling the extension to migration best practices, this webinar covered a range of topics to help you create print-ready reports from within the Tableau dashboard.During this webin...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.