Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

dataminr-microsite-logo-.png
Dataminr

Leveraging NASPO for Continuous Situational Awareness


Event Date: June 20, 2024
Hosted By: Dataminr

Lead time is critical when responding to public safety emergencies. Decision-makers need clarity and context as an event unfolds to effectively manage their operations to bolster first response, transportation, infrastructure protection and emergency management.

Artificial intelligence can help deliver reliable, relevant, real-time information for public sector organizations to protect the people and communities they serve by providing them with situational awareness. Having the right information at the right time means they can formulate the appropriate response strategy with speed and confidence.

During this webinar, attendees heard from Warren Scott, VP for Public Sector at Dataminr, and Teri Takai, Senior Vice President at eRepublic, as they discussed:

  • How real-time information helps you accelerate validation and response times
  • How multimodal and multilingual global information from over 1M data sources gives you richer context around events nearby and worldwide
  • The importance of NASPO members leveraging AI into their current workflows to streamline communication and response between agencies

Resources


Comply-to-Connect: The Basis for Cybersecurity
Whitepaper

Comply-to-Connect: The Basis for Cybersecurity

Comply-to-Connect, or C2C, is the Department of Defense’s next major step forward in network security for all networks comprising the Department of Defense Information Network (DoDIN) and at both the non-classified and classified levels. C2C is a program that delivers capabilities to accomplish two primary goals:

  1. First, C2C fills existing capability gaps in currently fielded enterprise security solutions through complete device identification, device and user authentication, and security compliance assessment.
  2. Second, C2C automates routine security administrative functions, remediation of noncompliant devices and incident response through the integration of multiple management and security products and continuous monitoring.

Download PDF