Back to Search Begin New Search Save Search Auto-Notify
How Organizations Can Measure Progress...
Attendees joined us to explore key frameworks, practical tools and common pitfalls in measuring data and AI literacy—drawing on years of experience working with thousands of learners across a wide range of industries.During the webinar, attendees learned how to: Apply proven techniques, such as cohort-based learning and scheduling strategies, to increase training engagement and completion rates across teamsEstablish a measurable baseline...
Add Favorite
From Data Overload to Decision Advantag...
Government analysts are tasked with making fast, informed decisions — but the volume and complexity of data from satellite imagery, sensors, reports, and open-source intelligence continue to grow exponentially. Analysts face an uphill battle to sift through it all fast enough to inform time-sensitive decisions. Watch this on-demand webinar that will explore how generative AI is transforming intelligence workflows by helping analysts quic...
Add Favorite
Quantum Threats Are Coming - Is Your Da...
Bad actors breach networks for two reasons: 1. to disrupt (rarely) and 2. to steal valuable data for sale or ransom. With the rise of Quantum Computing and AI, threats like Ransomware, Harvest Now Decrypt Later, and evolving cyberattacks are growing concerns. At the same time, stricter regulations—such as CJIS 6.0—are enforcing stronger data protection requirements.A PQC data-centric security approach ensures that even if attackers...
Add Favorite
Slash Costs & Complexity: Consolidate Y...
Slash Costs & Complexity: Consolidate Your SaaS Management & Boost Security AvePoint Webinar!Problem: Analysts report that 73% of Microsoft’s customers are using at least one third-party add-on product to manage and govern Microsoft 365. Of those same customers, 10% are finding true value by leveraging out of the box solutions. This can create new problems while managing multiple vendors to solve different problems your organizat...
Add Favorite
Optimize Government Operations: Salesfo...
During the webinar attendees saw how a leading general services department revolutionized 60+ processes, creating an AI-ready foundation that dramatically improves citizen services. In just one session, they discovered how to:Supercharge scheduling, budgeting and reporting.Streamline case and work management.Transform ordinary Salesforce views into powerful operational tools.
Add Favorite
Real-Time Risk Assessment: Transforming...
In today’s complex risk landscape, organizations responsible for vetting employees, contractors and associates face mounting challenges. From ensuring workplace safety to protecting sensitive information, the stakes are higher than ever. The sheer volume of publicly available data—combined with the speed at which decisions must be made—can overwhelm traditional vetting processes, leaving critical risks undetected.This webinar...
Add Favorite
Unlocking the Power of Social Determina...
Tired of traditional metrics that overlook the deeper causes of your clients’ challenges? Equip your team with CareSphere leveraging Artificial Intelligence (AI) and unlock the tools to make informed, data-driven decisions.During this webinar, our CoreSphere speaker gave an insightful demo and discussion on how to easily capture and harness Social Determinants of Health (SDoH) data using CareSphere’s scalable, flexible client and c...
Add Favorite
Achieving FedRAMP Compliance: A Success...
Missed the AWS and IT-CNP Webinar on achieving and maintaining FedRAMP authorization? You can still access expert insights and proven strategies to navigate compliance successfully. Learn how to overcome challenges, implement continuous monitoring, and leverage AWS and Carahsoft for a seamless compliance journey. Watch the webinar recording now and stay ahead in your FedRAMP efforts!
Add Favorite
Data Security Made Simple: How Best-of-...
During this exclusive joint session with Entrust and ShardSecure, we discussed how Agentless Data Protection and Key Management Solutions can work together to strengthen your security posture. We explored the pitfalls that lead to breaches and best practices to protect your organization with expert speakers, Ed Reynolds, Senior Product Manager at Entrust, Bob Lam, CEO and Co-Founder, ShardSecure, Inc and Jesper Tohmo, CTO and Co-Founder, Shard...
Add Favorite
Virtual Training Strategies That Work
Today’s virtual training demands more than just a video call and screen share. To truly connect with learners, organizations need dynamic, interactive environments that inspire participation and deliver measurable results. Whether you're facilitating onboarding, compliance training, or professional development, it’s time to move beyond the limitations of standard virtual meeting tools and reimagine what’s possible.Watch this...
Add Favorite
Back to Search Begin New Search