Elevate Your Threat Hunting Program
The complexity of today's networks and the sheer amount of information being provided has made threat hunting a necessary part of every security program. Discover how ReversingLabs can enrich Splunk data with our industry leading threat intelligence. We will show you how to easily hunt for threats specifically targeted at your organization using our Splunk app which enables quicker malware identification and visualization. During this on-deman...
Genius Machines: Great Power and the Pa...
In the last five years, the tools used in defense have evolved from a staple of science fiction to a real-world magnet for large-scale investment. In Hawaii, that means channeling technological advances for Indo-Pacific security. As the administration's defense strategy has pivoted towards China and great power competition, how is the U.S. matching new capabilities to new strategy, and what needs to happen next?Join Defense One and Nextgov for...
Improve Your Compliance Posture with Id...
Many modern hybrid enterprises and government agencies are struggling to ensure they have security controls everywhere necessary as well as being able to prove their effectiveness, especially with so many shared privileged accounts. Ever-changing industry as well as government regulations make it difficult to get and stay compliant. In order to reassure customers and the public that confidential data such as credit cards and health records are...
CyberCast: Secure Remote Access for Adm...
YOU’VE SECURED THE WORKFORCE, NOW SECURE PRIVILEGED ACCESS. Current work-from-home requirements have resulted in organizations enabling entire workforces for remote access. As the FBI and other agencies report, this is a boon for cyber attackers who see this expanded attack surface as a feeding frenzy opportunity. Organizations of all sizes are at increased risk and need to secure remote access for privileged users, whose identities can...
HPE Insights and Solutions for Enabling...
The COVID-19 pandemic has triggered enormous challenges for government IT, which must support a growing demand for a remote workforce to continue operations while responding to public health and welfare concerns. HPE and Aruba have mobilized the full weight of our respective resources and eco-system of partners to provide technology, solutions, expertise and support to help our government customers with these challenges. Join this webinar and...
The Power of Voice to Prevent Fraud
Nuance security and biometrics solutions enable easy and secure authentication by identifying a person based on their human traits; like their voice, fingerprints, face or even how they use their devices. The importance of security cannot be understated. Today's businesses rely on working with known customers in a friction-free environment. To get to that level of customer service, organizations need to be confident that their customer is who...
Navigating the BootHole Mitigation Process
Eclypsium researchers recently disclosed an arbitrary code execution vulnerability in the GRUB2 bootloader that can bypass Unified Extensible Firmware Interface (UEFI) and OS Secure Boot, impacting other OS defenses. In this webinar, John Loucaides, VP of Research & Development at Eclypsium, will help government agencies understand how to navigate the complex process of mitigating the GRUB2 BootHole vulnerability - without inadvertently ma...
Leverage Advanced Management and Securi...
With Adobe Document Cloud (DC), agencies across the nation are turning manual document processes into efficient digital ones. Adobe Acrobat DC and Adobe Sign empower agencies large and small to work with confidence, knowing that all PDFs and e-signature workflows are safe and sound through management features and security protocols -- all customizable to your organization's needs.Join our complimentary webinar to discover how your team can tak...
Cellular & RF Based Threat Detection, L...
Carahsoft and Bastille invite you to an executive briefing on finding phones, wearables, and gadgets through Cellular, Wi-Fi, Bluetooth, and Bluetooth Low Energy device detection. The Problem: Restricted Areas and Cellular Intrusion DetectionGovernment buildings have secure areas where no cell phones or other radio-emitting devices are allowed. Today, detecting and locating radio-enabled devices is largely based on the honor system or one time...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.