IP 101: Network Foundations for Secure...
The Internet Protocol (IP) has widely adopted, yet the components of its basic underlying parts and functions are often still mysterious, especially for audio and video transport. Learn the basics of network infrastructures and become familiar with key terms as you build your foundation of knowledge. Discover the under-the-hood requirements for building scalable, flexible, and secure AV networks. Gather IP Network foundational knowledge. Learn...
Uniting Threat and Risk Management with...
How can you ensure that your cybersecurity capabilities defend your organization as best they can? Intruders break past, security controls falter, and defenses fail against even basic cyberattack techniques. What should be done? Instead of trying to close every vulnerability, meet every standard, or buy the “best” technology, security teams can change the game by focusing their defenses on known threats. During this webinar, we wil...
Secure Desktop Optimization New Secu...
With the proliferation of data and where desk space is a premium, situational awareness is a major challenge for today’s government, military, and defense agencies. Given the driving need to view different data streams and access data at operational speeds, tools are needed to traverse separate classified levels at the same time. Join Vertiv and Dell as we discuss the new capabilities available through the introduction of the National In...
Raising the Bar on Device Management fo...
Defense organizations responsible for communications have a critical need to improve mobility. From deployed military to remote access for key personnel, the current state of the art for deployed communications systems requires hours of setup, and has security concerns that require high level approvals. Deployment of devices for classified communications depends on advanced technologies, such as dual VPN clients and has extensive configuration...
Employee Experience: Meeting your Reten...
Active-duty military, reservists, and civilian employees stationed in 163 countries make the Dept. of Defense (DoD) the nation’s largest and most geographically dispersed employer. Its greatest asset is its people. This is why employee engagement is vital. They play a prominent role in recruiting and retaining both civilian employees and active-duty personnel. While it helps the DoD understand the warfighter's needs and wants, an Employe...
Trust or Zero Trust? Going Beyond Privi...
Least privilege is intended to prevent “over-privileged access” by users, applications or services to help reduce the risk of exploitation without impacting productivity or involving the IT help desk. It may help to think of least privilege by its other name – least authority – as it provides only enough authority for an entity to complete the job at hand. The least privilege model can also help curtail costs and incre...
From Reactive to Proactive: Hunting for...
Cyber warfare is leveling the playing field for countries like Russia, Iran and North Korea. The SolarWinds backdoor showed that foreign adversaries can launch damaging attacks on traditionally more militarily adept nations. Organizations are finding themselves unprepared for these attacks as preventive solutions have failed to detect them. These threats have dwelled in some networks for weeks up to months before causing any damage. It's time...
High Speed Secure Networking at the Edge
The rapid pace of innovation in commercial IT technologies including cloud, big data, machine learning, IoT and ISR provide new opportunities for defense organizations to achieve and maintain C5ISR overmatch – as long as networks and computing power can securely deliver those benefits to the network edge. To achieve this, modern tactical networks must be deployable in reduced size, weight and power – while delivering ever more band...
Is Your Video Distribution Protected Fr...
Our missions are increasingly at risk of being compromised and hacked. The video, audio, KVM and control data that are crucial to these missions are at risk, even in a secure SCIF environment. Situational awareness relies on video and audio data for making accurate decisions in a timely manner. Protecting that critical information from threats is paramount to a mission’s success. Learn where your video and audio data might be at risk an...
Continuous Authorization with DevSecOps
Software is a foundational component of the modern defense departments. The current approach to software development is a leading source of risk for the U.S. Department of Defense (DoD): it takes too long exposing warfighters to unacceptable risk. To support national defense priorities, you need to deliver software rapidly and securely. DevSecOps practices and culture help improve both software delivery speed and cybersecurity. This webinar w...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.