̽»¨ÊÓÆµ

̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Archived Events

Splunk-New-Microsite-logo.png
Splunk Virtual Event

Event Date: April 29, 2020
Hosted By: Splunk & ̽»¨ÊÓÆµ
Attendees joined Splunk and ̽»¨ÊÓÆµ to learn how to use real-time data to monitor and manage your distance learning environment.During this webinar, participants learned about how operationalizing your data can help empower IT and security teams to:Secure a remote workforce, including monitoring ...
Splunk-New-Microsite-logo.png
Splunk Virtual Event

Event Date: April 22, 2020
Hosted By: Splunk & ̽»¨ÊÓÆµ
During this workshop, attendees gained a better understanding of how to create security relevant dashboards and alerts to showcase how Splunk can reduce MTTI & MTTR and streamline looking at security posture (logs uploaded via provided .csv).
Splunk-New-Microsite-logo.png
Splunk Virtual Event

Event Date: April 22, 2020
Hosted By: Splunk & ̽»¨ÊÓÆµ
The rapid evolution of cloud platforms has produced a continuum of options for government IT managers. With such a wide array of choices at their fingertips, it’s imperative for managers to adopt a Cloud Smart approach, identifying the options that best meet their ...
Splunk-New-Microsite-logo.png
Splunk Virtual Event

Event Date: April 16, 2020
Hosted By: Splunk & ̽»¨ÊÓÆµ
Attendees joined the webinar and learned how to relieve fatigue and focus on mission-critical initiatives with automation.During this webinar, participants learned more about how operationalizing your data can help empower IT and security teams to:Secure a remote workforce, including ...
Splunk-New-Microsite-logo.png
Splunk Virtual Event

Event Date: April 15, 2020
Hosted By: Splunk & ̽»¨ÊÓÆµ
Attendees learned from Splunk’s, Solutions Architect, Michael Sondag and ̽»¨ÊÓÆµ for a deep dive into the Splunk for Cybersecurity Maturity Model Certification (CMMC) solution. As the Data to Everything (D2E) platform, the Splunk for CMMC solution accelerates organizations’ journey to actively monitor and ...
Splunk-New-Microsite-logo.png
Splunk Virtual Event

Event Date: April 15, 2020
Hosted By: Splunk & ̽»¨ÊÓÆµ
Attendees joined the webinar and learned how to drive efficient collaboration among remote teams.During this webinar, participants learned more about how operationalizing your data can help empower IT and security teams to:Secure a remote workforce, including monitoring anomalous activity, remote access ...
Splunk-New-Microsite-logo.png
Splunk Virtual Event

Event Date: April 14, 2020
Hosted By: Splunk & ̽»¨ÊÓÆµ
Attendees joined the webinar and learned how to secure and scale on-demand VPN and other remote access applications.During this webinar, participants learned more about how operationalizing your data can help empower IT and security teams to:Secure a remote workforce, including monitoring anomalous ...
Splunk-New-Microsite-logo.png
Splunk Virtual Event

Event Date: April 09, 2020
Hosted By: Splunk & ̽»¨ÊÓÆµ
Attendees learned about shared stories of Splunk’s Department of Defense and National Security customers realizing the value of bringing data to every decision. Examples included:ITSI driving unprecedented Operational IntelligenceEnterprise Security setting the standard for Security ...
Splunk-New-Microsite-logo.png
Splunk Virtual Event

Event Date: April 08, 2020
Hosted By: Splunk & ̽»¨ÊÓÆµ
Ensure a safe and productive remote workforce.Attendees joined Splunk Interim CIO, Steve McMahon, and a panel of experts in a discussion on operationalizing data with tools and solutions to make confident decisions and take decisive actions at speeds the current crisis warrants.During this ...
Splunk-New-Microsite-logo.png
Splunk Virtual Event

Event Date: April 08, 2020
Hosted By: Splunk & ̽»¨ÊÓÆµ
During this workshop, attendees went through an introduction to Splunk’s CLI illustrating initial configuration and customization of Splunk including setting custom ports for processes and creating user roles with specific capabilities. Participants also covered the installation and initial configuration of a ...

Resources


Introducing Cohere’s Secure AI Frontier Model Framework
Blog

Introducing Cohere’s Secure AI Frontier Model Framework

Cohere’s Secure AI Frontier Model Framework explains the company’s practical approach to identifying and managing safety and security risks in its AI models from development through deployment. It outlines key components of its risk management methodology to help ensure models are secure, reliable, and responsibly used.


Fill out the form below to view this Resource.