Archived Events
Attendees joined us for a webinar designed to help government agencies navigate CJIS compliance and explore the latest security measures. Attendees gained insights from real-world case studies, including the City of Garland and the City of Northport, showcasing the practical implementation of ...
As fraud actors increase their operations in velocity and capabilities, especially with the use of emerging technologies as the weapons of choice, you and your citizens are at risk of becoming a victim. Are you able to rapidly and at scale, confirm who is behind the keyboard? If the answer is no, then this webinar is for ...
While all agencies are committed to rebuilding customer experience (CX) — and trust — in the 21st century, High Impact Service Providers, or HISPs, are the agencies leading the design and implementation of CX initiatives due to the scale and critical nature of their public-facing ...
In a time of fast-evolving digital threats, staying ahead in cybersecurity is key. Attendees joined us for an exclusive deep dive into cybersecurity with product experts from AWS and Palo Alto Networks.
Attendees joined us on May 15th to gain:
Watch AWS' New York Innovation Day on-demand recordings and presentations to hear industry experts discuss AWS solutions and how they can help you achieve digital transformation without disruption with topics including cybersecurity, artificial intelligence, machine learning, and more. Learn how the ...
Carahsoft and FedInsider invited attendees to a complimentary seminar to hear from state and local IT officials and corporate thought leaders. They discussed the steps agencies are taking to innovate their services, protect their customers and agencies, and what they are tackling first in Florida.
Our panel of ...
Cybersecurity has always contended with evolving threats. As the internet has become more embedded into social and economic life and handheld devices become ubiquitous, bad actors have devised new attacks to capitalize on new vulnerabilities.
During the 2024 CyberSmart Federal Day thought leaders from ...
The first pillar of a zero trust architecture is establishing identity for humans and devices alike. Humans, unlike devices, often have strong opinions about what works and what doesn’t, what is easy and what is more difficult than IT professionals realize. Our panel discussed identity, credentialing and access ...
During this webinar, we discussed:
How to empower your security team: Equip your team with seamless access to essential tools, all while safeguarding sensitive data.
Enterprise Shield: Navigate compliance demands and combat cyber threats, ...
As the newest branch of the military, Space Force is quickly building out the infrastructure it needs to be an effective fighting force, which means rich opportunities for government contractors. Given that space is now a major warfare domain, Space Force needs robust command and control systems, resiliency, cybersecurity, ...