The First AI Data Security Platform
Securing data against threats and breaches can be incredibly complex. Legacy data protection programs are strained underneath the weight of complex point products, visibility gaps, alert overload and slow response times to data risks. It’s time for the way you protect data to evolve. Join our launch event to see how Zscaler is harnessing the power of AI and unifying even more protection innovations to usher in the next phase of data security.
May 14, 2024
Organizer:
Zscaler Location:
Webcast
Securing the Identity Fabric in the Age...
In the realm of government cybersecurity, the Zero Trust framework stands as a beacon of defense against evolving threats. Central to its efficacy are the principles of identity and access management, which redefine traditional security paradigms. Zero Trust advocates for perpetual verification of users, devices, and resources, emphasizing a “never trust, always verify” mantra. Identity verification, facilitated by multifactor auth...
May 9, 2024
Organizer:
ATARC Location:
Webcast
Achieving OT Security Maturity: Closing...
While understanding the growing severity of cyber attacks on cyber-physical systems (CPS), many organizations struggle to prioritize and effectively combat the most dangerous threats due to process and technology gaps. Without OT risk management strategies and best practices in place, organizations will continue to face challenges in managing cyber risk to OT and critical infrastructure. In this webinar, OT Security Engineer Keith Walsh and a...
May 8, 2024
Organizer:
Claroty Location:
Webcast
FY24 National Firearms Program
Come learn about the National Firearms Program and how to report excess Firearms and other Specialized Categories of property (Aircraft, Vessels, Animals, and Foreign Gifts) into PPMS.gov for disposal (manage the disposition). This class focuses on reporting excess the National Firearms Program and Firearms Management. There is no charge for this class and you’ll earn One Continuous Learning Point by completing this hour-long virtual tra...
Accelerate Your Defense Against Modern...
Amid an advancing threat environment, it’s important to provide your clients with comprehensive security. Yet this is easier said than done when a skills shortage makes it hard to find and hire qualified defenders. In this webinar, we’ll look at the challenges IT providers face when up against an escalating SMB threat landscape. We’ll also explore how Blackpoint saves you time, money, and streamlines your operations, all the...
May 7, 2024
Organizer:
Blackpoint Location:
Webcast
Advanced Threat Protection for Governme...
In today’s hyperconnected world, where cyber threats evolve rapidly and cyber criminals operate with heightened speed and flexibility, staying ahead of these risks is paramount. Your security teams need to be equally agile and well-prepared. Join ATARC alongside government and industry experts for a comprehensive discussion on the latest threat vectors impacting agency infrastructures. Discover insights into how cloud-native security sol...
May 2, 2024
Organizer:
ATARC Location:
Webcast
Consolidation and Automation, Not Compl...
Security threats against organizations are constantly evolving, and the emergence of AI is redefining the threat landscape. The sheer number of available security tools can make it difficult for organizations to choose the right ones while ensuring interoperability. To address this challenge, it is increasingly important to prioritize investment and select security tools that work seamlessly to close coverage gaps and maximize visibility. Join...
Using the Tools at Hand to Get to Zero Trust
Federal agencies have been ordered to move toward zero trust architectures with alacrity, through Executive Order 14028 on improving cybersecurity and the Office of Management and Budget’s two memoranda, M-22-09 on meeting zero trust cybersecurity principles, and M-21-31 on improving investigative and remediation capabilities following cyber breaches. The Department of Homeland Security observed in its Zero Trust Implementation Strategy...
May 1, 2024
Organizer:
Fedinsider Location:
Webcast
Trellix TechInsight Quarterly: Product...
Endpoint security is undergoing a seismic shift to modern endpoint security, transforming from traditional EPP to endpoint detection and response (EDR) with an approach that provides a path to extended detection and response (XDR), network detection and response (NDR), and to deeper investigations and forensics at scale. Learn about this shift at the Trellix TechInsight Quarterly: Product Showcase on April 30 at 10am PT / 1pm ET / 5pm GMT. Joi...
April 30, 2024
Organizer:
Trellix Location:
Webcast
Building Responsible AI Workflows with...
Generative artificial intelligence (genAI) has arrived with the force of a tsunami across the federal government. In October, Executive Order 14110 on the safe, secure, and trustworthy development and use of AI established the broad outlines for how agencies should evaluate and implement their AI use cases. Now the Office of Management and Budget has issued a memorandum directing agencies to institute governance and risk management processes g...
April 30, 2024
Organizer:
FedInsider Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.