On Demand
Join this webinar to discover how to create a digital presence that doesn't just meet current expectations but sets standards for engagement and accessibility in the higher education sector. Register today!
Sponsored by Acquia, Lullabot and Carahsoft
The rapid evolution of artificial intelligence technology has made it imperative for higher education institutions to reevaluate and revamp their AI strategies, in order to make the most of existing and emerging capabilities impacting teaching, learning, research, and business operations. A well-honed strategy alone is not enough. Colleges and universities need a plan to prioritize their AI efforts, set aside the resources to fuel development, and move forward with implementation.
Sponsored by Oracle
In this fireside chat webcast, Campus Technology Editor in Chief Rhea Kelly will speak with Nadir Merchant, General Manager from IT Glue, about how intelligence-driven IT documentation can help IT teams streamline their operations and empower them to pursue strategic innovation and better support the institutional mission.
Sponsored by IT Glue
Join our session to explore a cutting-edge cloud-based access control solution offering centralized management, real-time updates, robust visibility, cloud-based diagnostics, and more.
Sponsored by Juniper Networks
In higher education's complex and increasingly competitive environment, data is currency — the essential medium enabling decision-making, research, and the student experience across an institution. The invaluable role of data has upped the stakes when it comes to cybersecurity. New technologies such as AI require a renewed focus on security in order to be leveraged to their full potential, and cyber attacks carry a heavy price not only in response and recovery costs, but also in loss of community confidence. What is the correct mix of effort, time, and resources to protect institutional data, systems, and reputation and provide a solid foundation for technology innovation?
Sponsored by Ferrilli
In the face of ever-evolving cybersecurity threats, colleges and universities need an agile data security strategy that encompasses not only threat detection and response, but also recovery after an attack occurs. Leveraging the cloud can help institutions confidently protect and recover their data, while also providing the peace of mind of an immutable backup to help get systems back online quickly and cleanly when needed.
Sponsored by Cohesity and AWS
Artificial intelligence and machine learning hold vast potential across all areas of higher education. Not only do these technologies enable new modes of learning, improve research outcomes, and accelerate decision-making, but they also play a pivotal role in cybersecurity risk analysis, streamlining threat detection and automated incident response. It’s important for higher education leaders to understand the risks and benefits as they deploy these tools and take advantage of the opportunity to continue technology-based transformation within the institution.
Sponsored by Fortinet
Persistent data silos have long been a challenge in higher education, separating pockets of information, expertise, and culture and impeding efforts to engage in data-informed decision-making across the institution. But even as colleges and universities begin to unify their data sources and implement best practices in data management and data governance, it can be difficult to translate that data into a positive impact on student outcomes. How can institutions move their data efforts forward to better solve complex problems and drive the strategic mission?
Sponsored by AWS
There’s no question that artificial intelligence has become a powerful tool for both cybersecurity attacks and defenses, potentially increasing the volume and velocity of attacks while speeding the detection and analysis of malicious activity. How will AI change the way organizations are impacted by cybersecurity threats in the coming year? In this interactive discussion, we’ll talk about AI-enabled attack techniques in use today, what threats to watch on the horizon, and how institutions should prioritize their cybersecurity strategies accordingly.
Sponsored by Cisco