Archived Events
As the federal government transitions to a new administration and new priorities, one initiative that’s expected to remain is the Federal Data Strategy. Data governance is at the forefront of CDO’s agendas to leverage data as a strategic asset to achieve mission outcome. View this on-demand webinar ...
Effective communication relies on visuals to make a lasting impression, and including images with information-rich text is proven to capture the attention of your target audience.Watch this on-demand webinar to learn how Adobe Stock delivers a stunning visual information experience to both citizens ...
Recognizing the risk potential of commercial mobile apps from public app stores back in 2016, DHS created the AppVet program. To support this program, NowSecure provided an easy-to-use mobile app vetting solution covering millions of apps in the public app stores. The solution analyzes and continuously ...
Do you think you know DocuSign? More than 1,300 local, state, and federal organizations use DocuSign to enable citizens, businesses, and staff to work smarter and more effectively.Our 30-minute webinar on March 4th taught attendees how DocuSign is serving citizens and agencies that go far ...
This webinar brought together a panel of public and private sector leaders to discuss how going digital can help DOTs create more efficient processes while preserving taxpayer dollars. Attendees were able to:
During this virtual Capture the Flag event attendees learned how they can unlock the full potential of the cloud with:Comprehensive securityEnable DevSecOpsConsistent security across the cloud
The world has been brought to its knees over the past 12 months due to the COVID-19 pandemic, but the availability of vaccines has given us hope to halt the spread. However, a mass vaccination effort ...
Managing identity and access requirements for the hundreds of applications that power today’s agencies is a daunting challenge. In addition, as access requirements evolve, new authentication methods and entitlements will be needed, raising the bar for Zero Trust implementations. In this ...
In the race to set up a remote workforce, it is important to understand what identity risks and vulnerabilities that may have resulted from enabling employees to work from home. Gaining visibility and managing changes in access and entitlements is essential to your security posture, but it does not have to be ...
The scale and power of modern artificial intelligence can seem intimidating, but it doesn't have to be. As datacenters have gotten bigger, small edge computers have become more capable and to the point where cutting-edge computer vision techniques can run on devices in the palm of your hand for fewer watts than a ...