̽»¨ÊÓÆµ

̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Events and Resources

Events


No events were found. Please try another search.

Resources


Article

This resource explores the evolution and growing importance of open-source intelligence (OSINT) in national security, highlighting how it has moved from a peripheral tool to a critical asset. Through insights from Melisa Stivaletti and recent institutional developments, it underscores the value of p...

Gain confidence in how AI supports fair and effective hiring decisions with the Phenom Fit Score: 2025 Audit Report. Download the report to review independent findings on validity, reliability, and bias analysis, and see how Fit Score helps recruiters prioritize candidates while supporting equitable...

In large organizations, fragmented emergency communication systems create dangerous silos, where critical alerts may not reach all personnel—even those in the same location—delaying response and compromising safety. BlackBerry AtHoc Super Enterprise solves this by unifying communications...

The platform gives agencies the flexibility to manage digital signature processes from inside popular productivity apps. Get instant verification, audit trails, records management options, and API support to help extend your existing technology investments even further.

Samsara is helping enhance safety and efficiency of school transportation programs by implementing AI capable software while maintaining the personal touch of drivers.

This white paper outlines 10 common pitfalls of enterprise endpoint backup, explaining why traditional backup methods are no longer sufficient in the modern corporate environment. It details how a modern endpoint backup solution can address challenges like remote workforces, ransomware, and complian...

Cypress-Fairbanks ISD in Houston focused on increasing student safety and transportation efficiency by collaboratively utilizing technology, insights and front-line driver experience.

The power of digital identity assurance extends beyond simple identity verification, providing essential security in the increasingly online interactions of the public sector. LexisNexis® Risk Solutions delves into the complexities of digital identity assurance, emphasizing its importance in protect...

The need for upscaling and rescaling of cybersecurity training in the workplace between the organization and the employees. Working the most efficient way to find balance and use the time to train and creating a culture shift.

This resource explores the challenges of recovering clean data quickly after a ransomware attack, noting that most organizations find it problematic. The Druva Data Resiliency Cloud, built on a cloud-native architecture, simplifies and accelerates the complex process of ransomware recovery by offeri...