Archived Events
In mid-2019, the General Services Administration chartered the first government-wide collaborative group to accelerate the adoption of RPA – the Federal RPA Community of Practice (RPA COP). Boasting membership from 50+ federal agencies and over 800 members, the RPA COP published the Federal RPA Program Playbook, a ...
Security incidents continue to escalate throughout the government and these agencies hold a wealth of personal information that hackers would love to get their hands on. However, many state, county, and local governments lack the cyber security resources to combat these threats - making them easier ...
During this workshop hosted by WWT, Dell Technologies, VMware, GRIMM, and Carahsoft, attendees gained an understanding of the following learning objectives:Cyber Workforce Development - How you can take a renewed approach of hands-on learning and hone in on your cyber skills to ...
If you are experiencing remote work performance or availability problems, than the scale and reliability of a cloud solution may ease your burden. Akamai's Enterprise Application Access (EAA) solution can provide access to critical applications no matter where they are hosted, maintain the continuity of agency’s core ...
Stuck at home and worried how your IT or Program Investments are faring?Federal agencies are experiencing extreme scrutiny on the spending of their budgets. These organizations face the challenge of understanding and integrating data from many portfolios. Strategic Plans and Enterprise Architecture are ...
During this workshop hosted by WWT, Dell Technologies, VMware, GRIMM, and Carahsoft, attendees gained an understanding of the following learning objectives:Cyber Workforce Development - How you can take a renewed approach of hands-on learning and hone in on your cyber skills to ...
As the interconnectivity of business and technology keeps growing, organizations are facing an increasing amount of network traffic and tools on a day-to-day basis. The need for efficiency, performance, and security on complex environments has never been greater. By applying visibility and analytics on every layer of your ...
During this webinar, attendees learned several ways to implement effective remote worker strategies, including:Maintaining productivity when faced with uncertain connectivityRisk-free ways to provisioning access for remote employeesReal world examples of work from home policiesSafely ...
Attendees learned from Splunk’s, Solutions Architect, Michael Sondag and Carahsoft for a deep dive into the Splunk for Cybersecurity Maturity Model Certification (CMMC) solution. As the Data to Everything (D2E) platform, the Splunk for CMMC solution accelerates organizations’ journey to actively monitor and ...
The work-from-home era is here. Companies throughout North America and around the world suddenly find themselves with large numbers of remote employees. Years of cybersecurity preparation have become obsolete overnight - and new cybersecurity problems are now urgently front-and-center.What do you need to ...