Upcoming Events
As the federal government transitions to a new administration and new priorities, one initiative that’s expected to remain is the Federal Data Strategy. Data governance is at the forefront of CDO’s agendas to leverage data as a strategic asset to achieve mission outcome. Join thought leaders from ...
Recognizing the risk potential of commercial mobile apps from public app stores back in 2016, DHS created the AppVet program. To support this program, NowSecure provided an easy-to-use mobile app vetting solution covering millions of apps in the public app stores. The solution analyzes and continuously ...
Do you think you know DocuSign? More than 1,300 local, state, and federal organizations use DocuSign to enable citizens, businesses, and staff to work smarter and more effectively.Join us on March 4th at 11:00am PT for a 30-minute webinar to learn about how DocuSign is serving ...
Effective communication relies on visuals to make a lasting impression, and including images with information-rich text is proven to capture the attention of your target audience.Join our complimentary webinar to learn how Adobe Stock delivers a stunning visual information experience to both ...
From procurement contracts, to employee agreements, to roadway construction projects, department of transportation (DOT) paperwork can be complex in the best of times. Roadway construction projects alone can generate thousands of pages of ...
In this session, Megan McElroy, Public Sector Partner Sales Engineer, AWS, will discuss the tools and skills your team needs to automate security and formalize security configurations. You'll take back key action items to your team to accelerate the process of building, launching, and ...
With states experiencing an overwhelming number of Unemployment Insurance Claims and Pandemic Unemployment Assistance Claims, it's critical to have the correct systems in place to properly process those claims. Federal, state, and local government agencies must ensure that improper payments and fraudulent claims are ...
With the increase of high-profile breaches, it is becoming clearer that compliance does not equal security. And while most development teams want a secure software development lifecycle, the increasing pressure to get to market faster means check the boxes - and no more. Combining the top ...
Security teams work hard on the front lines to identify, analyze, and mitigate threats. Yet despite all our efforts, visibility into malicious activity remains challenging as the meantime to identify a security breach is still 197 days, with the meantime to containment being another 69 days after initial detection.The ...
Are you wondering what capabilities your agency can unlock with your Zoom for Government account? Don't miss out on Carahsoft's weekly demos and discover all the tips and tricks to successfully implement your Zoom for Government account.Dive in and learn about: Account and ...