Defend, Protect, Educate: Revolutionizi...
Thank you for your interest in our Conceal webinar: Defend, Protect, Educate: Revolutionizing Browser Security for Educational Institutions and Students Webinar Highlights: Understand the rising threat landscape and the risks posed by cyberattacks on educational institutions Learn how ConcealBrowse addresses browser-based threats, combats click rates and neutralizes evolving phishing tactics Explore ConcealBrowse’s role in addressing per...
Cyber-Informed Engineering for OT Secur...
Attendees joined us for a webinar focused around IT/OT integration for AVEVA PI users. Cyber-Informed Engineering (CIE) is emerging as the most useful change in perspective in Operational Technology (OT) security in a decade. CIE represents a shift in OT security, offering a dual-sided approach. On one side, it educates engineers about cyber threats and mitigation strategies. On the other, it leverages powerful safety, protection and network e...
Definitive Timeline: Federal Guidance o...
ReversingLabs and Carahsoft are excited invited attendees to join us for a virtual, conversation-style webinar to discuss compliance and guidance initiatives that have shaped the federal government's policies on software supply chain security. We heard from Charlie Jones, Director of Product Management, ReversingLabs during this session where he covered the following topics: 2023's major federal initiatives for improving software supply chain...
Enforce Least Privilege Across Every Endpoint
Almost every cyberattack today involves the exploitation of privileges. Broad privileges and entitlements greatly expand the attack surface and leave your organization extremely vulnerable to security breaches. However, a least-privilege access approach requires that users and programs receive the least amount of permission when required to complete specific tasks. Least privilege is one of the most essential security measures for organization...
Integrating SBOM and Vulnerability Resp...
The visibility that a Software Bill of Materials (SBOM) gives into the ingredients that make up software components is critical to understanding cybersecurity risks. But understanding is only part of the solution. Organizations need to be ready to act on vulnerabilities before they impact system security. Attendees joined ServiceNow to examine the synergies between ServiceNow's Vulnerability Response framework and the principles underpinning C...
Tableau Enablement Series Part 5: Secur...
In today's data-driven landscape, ensuring the security of your analytics environment is paramount. Join our webinar to enhance your Tableau security expertise and explore how cybersecurity principles intersect with Tableau's features to ensure secure data access for your users. During this webinar, attendees learned how to: Step up their Tableau security game: Attendees learned how to leverage Tableau's built-in features to secure their analy...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.