252 webcasts found
+ 246 past events found
Back to Search Begin New Search Save Search Auto-Notify
Elevate Your Threat Hunting Program
The complexity of today's networks and the sheer amount of information being provided has made threat hunting a necessary part of every security program. Discover how ReversingLabs can enrich Splunk data with our industry leading threat intelligence. We will show you how to easily hunt for threats specifically targeted at your organization using our Splunk app which enables quicker malware identification and visualization. During this on-deman...
Add Favorite
Protect Your Controlled Unclassified In...
Classified Unclassified Information (CUI) is the path of least resistance for adversaries, and loss of aggregated CUI is one of the most significant risks to national security. Protecting your CUI is the most critical data protection topics for 2021. If your agency is only using encryption of data-at-rest (db) and encryption of data-in-transit (SSL); you are significantly exposed when your data is utilized and displayed within your apps. Your...
Add Favorite
Protect Against Ransomware and Destruct...
This on-demand webinar Explores how Dell EMC's PowerProtect Cyber Recovery helps provide maximum protection to critical data and reduces the downtime associated to data loss in the event of a cyber-attack. With multiple layers of protection and security, Dell Technologies offers a turnkey solution that can monitor data integrity. Their secure digital vault can easily isolate data from the attack surface with an operation air gap to ensure wor...
Add Favorite
Enabling Secure Data Recovery Within Yo...
View this on-demand webinar to learn about: How to manage the entire data recovery incident: job submission; prepaid device enrollment; shipping; and reporting Supporting work from home with a workflow designed around the widespread adoption of Bring Your Own Device (BYOD) and the increasingly mobile (and home-based) workforce Learning how enrolling devices in a protection plan streamlines admin processes, lowers costs, and meets SLA's How to...
Add Favorite
Accelerate Security, Agility, and Visib...
Maintaining physical, on-prem servers can be expensive. Between the hard cost of on-prem equipment and the soft labor cost to maintain these systems, it's no wonder that more businesses are taking their holistic digital ecosystem to the cloud.View this on-demand webinar supporting your cloud migration efforts. As more critical workloads move to AWS, you need to gain critical security, operational, and cost management insights across your entir...
Add Favorite
Unit 42 by Palo Alto Networks
Unit 42 brings together world-renowned threat researchers with an elite team of security consultants to create an intelligence-driven, response-ready organization. As threats escalate, Unit 42 is available to advise federal agencies on the latest risks, assess their readiness and help them recover when the worst occurs. Whether responding to a breach or managing cyber risk, Palo Alto Networks understands your challenges. Hailing from US govern...
Add Favorite
DNS Security Data Exfiltration Workshop
View our on-demand recording enablement security workshop. In June 2020, the NSA Cybersecurity Director said that securing DNS can stop 92% of malware attacks on a network. Next-gen firewalls and endpoint tools have left behind DNS-based security blind spots. This workshop will walk system engineers through the conceptual abstracts of DNS security and bring a hands-on demonstration to enable attendees to test a network for DNS security gaps....
Add Favorite
State & Local Security Thought Leadership
The cyber theft of private and confidential information from government agencies, business, and private individuals exceeded $6 trillion in 2021. The modern spy is responsible for these technologically advanced attacks targeting your data.Join VMware, WWT, and Carahsoft for an informative talk with Eric O'Neill, VMware's National Security Strategist. Hear him discuss real-life spy stories and a review of recent massive cyber-attacks to show ho...
Add Favorite
Turn Your Endpoints Into Defendpoints
Everyone knows that cybersecurity must be a top focus for public sector agencies. The prevalence of attacks - only increasing over the last few years - has offered plenty of new insights into how different endpoints are being targeted. With the growing number of endpoints within agencies, opportunities to break through and compromise systems are extensive. Agencies must ensure that all of their endpoints are completely protected and immune to...
Add Favorite
Genius Machines: Great Power and the Pa...
In the last five years, the tools used in defense have evolved from a staple of science fiction to a real-world magnet for large-scale investment. In Hawaii, that means channeling technological advances for Indo-Pacific security. As the administration's defense strategy has pivoted towards China and great power competition, how is the U.S. matching new capabilities to new strategy, and what needs to happen next?Join Defense One and Nextgov for...
Add Favorite
Back to Search Begin New Search