Back to Search Begin New Search Save Search Auto-Notify
Unlocking the Power of Spatial Analytic...
This hands-on webinar explored how any analyst can master spatial analytics in Tableau - no GIS background required. Learn how to integrate geographic data into your workflows, uncover hidden patterns and deliver deeper insights through intuitive mapping tools. During this webinar, attendees learned:How to use readily available spatial data to enrich analysisReal-world public sector case studies showcasing spatial impactBest practices for visu...
Add Favorite
Cleared for Takeoff: Optimize FAA Opera...
The Federal Aviation Administration (FAA) relies on high-performing, scalable containerized applications to support aviation safety, efficient air traffic management and regulatory enforcement. Ensuring these applications run smoothly is essential to mission success, enabling real-time data analysis, secure information sharing and rapid response to operational demands. On May 28th, participants joined Red Hat and F5 experts for a hands-on sess...
Add Favorite
Getting Started with Agentic AI: Identi...
Attendees joined us while we dove into the essentials for identifying and selecting high-value Agentic AI use cases.During this webinar, we:Discuss key considerations and criteria that help determine the best areas in your organization for AI-driven automation.Delve into a practical example showcasing automated roadmap generation from a backlog of demand, demonstrating how platform owners can leverage Agentic AI to streamline strategic planning.
Add Favorite
CTEM In Action: Providing Compliance, S...
As our CTEM series concluded, this final session brought together the critical elements needed to operationalize a proactive exposure management program. Agencies and organizations managing cyber-physical systems—especially those with OT, IoT and on-prem infrastructure—had to move beyond visibility to actionable defense. Armis experts demonstrated how to implement the final stages of a CTEM framework: delivering early warning of th...
Add Favorite
F5 Red Hat Tech on Tap
F5 Tech on Tap is back for 2025! F5, Red Hat, and Peraton hosted an interactive session highlighting how F5 ADC 3.0, F5 AI Gateway, and Red Hat technologies provide the tools you need to maintain resilience across an increasingly complex and expanding threat landscape.Attendees learned how our solutions can:Combat Emerging AI Threats: Discover the F5 AI Gateway, a cutting-edge solution providing real-time resilience against emerging cyber risk...
Add Favorite
Unlocking the Power of Redis with Googl...
During this webinar, we discussed:Redis Vector Capabilities for AI WorkloadsScaling with RedisRedis access, security & airgap with Google
Add Favorite
Smarter IT for State & Local Government...
In this webinar, RavenTek's Ryan Coleman and Zach Holloway discussed how government leaders utilize ManagedDEX, a digital employee experience (DEX) solution that reduces downtime, accelerates troubleshooting, and supports digital transformation. Attendees learned how to:Proactively resolve issues to minimize disruptions and improve user experienceEmpower IT teams with AI-driven, proactive operations and continuous monitoringModernize and optim...
Add Favorite
Modernizing the Courtroom
As hybrid court proceedings continue to reshape the justice system, courts are increasingly seeking secure, seamless, and purpose-built technology solutions. Recently, Zoom, BEINCOURT, and Carahsoft hosted an engaging and interactive webinar highlighting how their integrated tools are helping courts modernize operations without compromising courtroom control or security. Event Highlights Included:A live demo from the Carahsoft Mock CourtroomHo...
Add Favorite
The Nearest Neighbor Attack: How it wor...
Cyber threats are evolving—attackers no longer need to be physically close to breach your wireless network. The Nearest Neighbor Attack redefines proximity, allowing hackers to exploit dual-homed devices and neighboring networks to infiltrate your infrastructure.Attendees learned:What is the Nearest Neighbor Attack is and how does it work?What real-world incidents exposed this new risk?What the key defense strategies are to secure your o...
Add Favorite
Why Privilege Matters: Stopping Cyber T...
Cyber threats are evolving, and privileged access remains a top target for attackers. 80% of Windows breaches succeed due to excessive privileges, making it crucial for organizations to rethink their security strategies. Dave Gunther, Regional Sales Manager at CyberFOX, explored how businesses can strike the perfect balance between security and productivity with Zero Standing Privilege (ZSP) and Least Privilege Access. Attendees learned how mo...
Add Favorite
Back to Search Begin New Search