Back to Search Begin New Search Save Search Auto-Notify
The First AI Data Security Platform
Securing data against threats and breaches can be incredibly complex. Legacy data protection programs are strained underneath the weight of complex point products, visibility gaps, alert overload and slow response times to data risks. It’s time for the way you protect data to evolve. Join our launch event to see how Zscaler is harnessing the power of AI and unifying even more protection innovations to usher in the next phase of data security.
May 14, 2024
Organizer: Zscaler
Location: Webcast
Add Favorite
Securing the Identity Fabric in the Age...
In the realm of government cybersecurity, the Zero Trust framework stands as a beacon of defense against evolving threats. Central to its efficacy are the principles of identity and access management, which redefine traditional security paradigms. Zero Trust advocates for perpetual verification of users, devices, and resources, emphasizing a “never trust, always verify” mantra. Identity verification, facilitated by multifactor auth...
May 9, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Achieving OT Security Maturity: Closing...
While understanding the growing severity of cyber attacks on cyber-physical systems (CPS), many organizations struggle to prioritize and effectively combat the most dangerous threats due to process and technology gaps. Without OT risk management strategies and best practices in place, organizations will continue to face challenges in managing cyber risk to OT and critical infrastructure. In this webinar, OT Security Engineer Keith Walsh and a...
May 8, 2024
Organizer: Claroty
Location: Webcast
Add Favorite
FY24 National Firearms Program
Come learn about the National Firearms Program and how to report excess Firearms and other Specialized Categories of property (Aircraft, Vessels, Animals, and Foreign Gifts) into PPMS.gov for disposal (manage the disposition). This class focuses on reporting excess the National Firearms Program and Firearms Management. There is no charge for this class and you’ll earn One Continuous Learning Point by completing this hour-long virtual tra...
May 7, 2024
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Accelerate Your Defense Against Modern...
Amid an advancing threat environment, it’s important to provide your clients with comprehensive security. Yet this is easier said than done when a skills shortage makes it hard to find and hire qualified defenders. In this webinar, we’ll look at the challenges IT providers face when up against an escalating SMB threat landscape. We’ll also explore how Blackpoint saves you time, money, and streamlines your operations, all the...
May 7, 2024
Organizer: Blackpoint
Location: Webcast
Add Favorite
Advanced Threat Protection for Governme...
In today’s hyperconnected world, where cyber threats evolve rapidly and cyber criminals operate with heightened speed and flexibility, staying ahead of these risks is paramount. Your security teams need to be equally agile and well-prepared. Join ATARC alongside government and industry experts for a comprehensive discussion on the latest threat vectors impacting agency infrastructures. Discover insights into how cloud-native security sol...
May 2, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Consolidation and Automation, Not Compl...
Security threats against organizations are constantly evolving, and the emergence of AI is redefining the threat landscape. The sheer number of available security tools can make it difficult for organizations to choose the right ones while ensuring interoperability. To address this challenge, it is increasingly important to prioritize investment and select security tools that work seamlessly to close coverage gaps and maximize visibility. Join...
May 2, 2024
Organizer: World Wide Technology
Location: Webcast
Add Favorite
Using the Tools at Hand to Get to Zero Trust
Federal agencies have been ordered to move toward zero trust architectures with alacrity, through Executive Order 14028 on improving cybersecurity and the Office of Management and Budget’s two memoranda, M-22-09 on meeting zero trust cybersecurity principles, and M-21-31 on improving investigative and remediation capabilities following cyber breaches. The Department of Homeland Security observed in its Zero Trust Implementation Strategy...
May 1, 2024
Organizer: Fedinsider
Location: Webcast
Add Favorite
Trellix TechInsight Quarterly: Product...
Endpoint security is undergoing a seismic shift to modern endpoint security, transforming from traditional EPP to endpoint detection and response (EDR) with an approach that provides a path to extended detection and response (XDR), network detection and response (NDR), and to deeper investigations and forensics at scale. Learn about this shift at the Trellix TechInsight Quarterly: Product Showcase on April 30 at 10am PT / 1pm ET / 5pm GMT. Joi...
April 30, 2024
Organizer: Trellix
Location: Webcast
Add Favorite
Building Responsible AI Workflows with...
Generative artificial intelligence (genAI) has arrived with the force of a tsunami across the federal government. In October, Executive Order 14110 on the safe, secure, and trustworthy development and use of AI established the broad outlines for how agencies should evaluate and implement their AI use cases. Now the Office of Management and Budget has issued a memorandum directing agencies to institute governance and risk management processes g...
April 30, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Back to Search Begin New Search