Back to Search Begin New Search Save Search Auto-Notify
Dual-Use Technology: Accelerating Capab...
In an era where technology advancements are both rapid and revolutionary, distinguishing between civilian and military applications poses significant challenges and opportunities for national security, foreign policy, and global technological leadership. This webinar delved into the intricacies of dual-use technology, spotlighting the urgent need for innovative approaches to identify, regulate, and leverage these technologies in bolstering sec...
Add Favorite
Bolster Identity Security with Password Safe
Attacks on identities, especially those with elevated access and privileges, are at an all-time high. Yet agencies are challenged with securing significantly more privileged accounts and supporting vastly larger decentralized networks than in years past. In this perimeter-less, remote world, organizations need a higher degree of privileged access protection that eliminates the ability for attackers to gain access and move laterally. A zero tru...
Add Favorite
Addressing Digital Document Accessibili...
In March 2022, the U.S. Department of Justice stated “Inaccessible web content and/or documents means that people with disabilities are denied equal access to information. An inaccessible website and documents can exclude people just as much as steps at an entrance to a physical location”. How is your organization addressing document accessibility, security, and usability? How are you leveraging your document as a digital ambassado...
Add Favorite
Introducing DocuSign Web Forms
Attendees joined us on Wednesday, April 24, 2024, to hear experts share insights on how to streamline data collection and speed up signing in one interactive experience with DocuSign Web Forms.
Add Favorite
Set It and Forget It: Practical Automat...
Do you have too many Security Analysts and Engineers sitting around with nothing to do? We didn't think so; you are not alone. You may have heard how security automation can elevate your team and help move you from playing defense and reacting to incoming threats. Go on the offensive, get empowered, and get in control of your security operations to achieve your strategic goals. Splunk’s Security Orchestration, Automation, and Response (S...
Add Favorite
Unlock the True Power of Zero Trust thr...
In today’s digital landscape, corrupt content poses unprecedented challenges to cybersecurity. The mass proliferation and fragmentation of content communication systems (file-sharing services) has created threat opportunities that must be addressed urgently. View the on-demand webinar to learn how Kiteworks-enabled Private Content Network (PCN) and Forcepoint’s Zero Trust Content Disarm and Reconstruction (CDR) has combined to cre...
Add Favorite
Sea-Air-Space 2024 Webinar Series: Fort...
Thank you for your interest in our Sea-Air-Space 2024 Webinar Series, Ivanti Session: Fortifying DoD Networks with CAASM & Patch Management Attendees of this webinar learned how Ivanti can help your organization: Implement a risk-based approach for vulnerability prioritization and patching in DoD and Federal networks Incorporate vulnerability management processes through automation Enable better collaboration between IT and security stakeh...
Add Favorite
Automated & Continuous Security Complia...
Are you struggling to keep up with ever increasing security compliance and regulatory requirements? Is your team tired of manually intensive and labor some work for keeping up compliance efforts? Unlock the potential of automated and continuous security compliance and risk management to fortify your organization's defenses. Attendees joined us to learn more about: Regulations and industry standards driving cybersecurity efforts in the public s...
Add Favorite
Roadmap to DoDD 8140.03M Compliance: A...
With the release of new DoDD 8140.03M, compliance remains a top concern for agencies. In a dynamic and rapidly changing cyber landscape, it's never been more important to stay ahead of the curve. While it’s no easy task to navigate, early implementation and strategic planning are critical to the nation’s security. WillCo Tech offers trusted cybersecurity expertise management, equipping the DoD workforce with the largest cybersecuri...
Add Favorite
AO Perspectives: Managing Risks and Str...
Picture this: you're on the brink of securing that crucial ATO approval, but the path is fraught with pitfalls—complex regulations, potential human errors, and the constant specter of cyber threats lurking in the shadows. As an Authorized Official (AO), you're all too familiar with the uphill battle of navigating the complexities and risks of the ATO package approval process while maintaining the resilience of your organization's defense...
Add Favorite
Back to Search Begin New Search