NVIDIA Webinar - From Cloud to On-Prem
Artificial Intelligence (AI) promises to unlock new frontiers, but its adoption in government has been limited. Slow-computing architectures can't deliver the resources demanded by modern AI use cases and "shadow-IT" implementations can't scale. This year, government IT managers have the opportunity to lead with an infrastructure strategy that enables their organization to realize the benefits of accelerated AI development across people, proce...
Mitigating Your Data Complexity
Too many organizations struggle with the complexity of their own data. An extensive 50-60 percent of enterprise data is "dark" and serves no valuable insight, according to IBM and Veritas research – don't let your agency be held back by that same confusion. You need to be able to tackle business challenges without worrying about the complexity of your IT environment. Join us for a live webinar on the necessity of abstracting complexity f...
Live Webinar: Transformative Digital En...
Join Principal Systems Engineer Cary Bryczek for a webinar to discuss how Jama Software's modern approach to digital engineering bridges the gap between modeling tools and the siloed document world. Guidance released by the U.S. Secretary of Defense in 2018 urged government organizations to put in place new practices to modernize delivered systems with an emphasis on accelerating delivery. Is your organization prepared to undergo this digital...
Protecting Your Election Security Infra...
Join F5 Networks and Carahsoft for an in-depth overview of the election system threat landscape, attack surface, bots and botnets, and zero-trust principles to protect election infrastructure. With the 2020 election cycles on the horizon, now is the perfect time to brush up on election security concepts and how F5 solutions protect this critical infrastructure.This webinar will discuss how F5 provides a variety of security solutions to mitigat...
PeopleSoft Best Practices: Secure Acces...
As the core of your organization, sensitive data inside PeopleSoft has become a top target for malicious threats. Both internally and externally. With native PeopleSoft security and compliance features trying to keep up with modern threats, organizations must evaluate strategies to strengthen authentication and gain deeper visibility into user activity. Join Appsian and Carahsoft, during their webinar, as PeopleSoft experts at Appsian discuss:...
Identify and Prevent Ransomware Attacks
Ransomware attacks on colleges and universities are the latest cyber threat to hit the headlines. Reports from campuses in Colorado, New Jersey, and New York City are the latest examples of how higher education is one of the most targeted industries with a significant number of users and vast amounts of data to protect.If successful, ransomware attacks have proven to be extremely lucrative. Security leaders within higher education need strateg...
SAP ERP Best Practices: Strengthen Acce...
As the core of your organization, the business risks inherent with users executing transactions inside SAP can be costly, time-consuming to remediate, and damaging to an organization's reputation. With native SAP security and compliance features failing to keep up with today's dynamic threats, organizations must evaluate strategies for strengthening access controls and gaining deeper visibility into user activity. Join Appsian and Carahsoft, d...
Let's Take This Online
Have you been hesitant to make the switch to virtual classrooms? Maybe you have one, but just don't like using it. There are so many things to love about in-person classroom interactions - seeing your trainees face-to-face, answering their questions as they come up, and breaking them into groups to discuss and learn from each other. Besides, you love sitting in traffic on your way to work, traveling to remote offices to train other teams, and...
Identify Nefarious Actors and Prevent D...
You are invited to join SailPoint and Splunk for a live webinar on Tuesday, February 18th to learn about the challenges and impact of Insider Threat and how Identity and Access Governance, Privileged User Management, and User Behavior Analytics are critical in protecting high value assets from nefarious actors. When properly implemented modern identity governance and administration, identity audit, behavior monitoring, and analytics provide vi...
AvePoint Webinar: Debunking Myths: Nati...
Join AvePoint for a free webinar where we will debunk some of the more popular myths to show you how to maximize your coverage using native capabilities. Native Office 365 retention capabilities are often undersold by third-party backup vendors, leading agencies to second guess what level of data protection they actually need. The reality is that native safeguards, when managed correctly, can be the right choice for certain agencies to cover c...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.