92 webcasts found
+ 86 past events found
Back to Search Begin New Search Save Search Auto-Notify
Go Beyond IAM: Implementing IGA to Miti...
During this Pathlock and Carahsoft webinar, attendees heard from top security experts on how you can expand your SAP security strategy to layers below the network to include vulnerability management, dynamic authorization (zero trust), and data loss prevention - all from a single platform. Register to view this on-demand recording.
Add Favorite
Bridging Borders: How AI and Public Inf...
This webinar brought together border security and artificial intelligence (AI) experts to explore best practices for integrated border management, with a specific focus on the use of AI and publicly and commercially available information sources to detect and prevent cross-border crime. Participants learned: How AI can improve the effectiveness of border management systems in a myriad of ways, such as by increasing the accuracy of name matchin...
Add Favorite
Mastering Identity Governance: Enhancin...
Many agencies struggle to keep up with recent Executive Orders, Digital Transformation, and Zero Trust Strategies when creating a cohesive platform. Identity is the first pillar of Zero Trust and waiting years to bring together a system that satisfies all your identity-based controls is not an option. UberEther provides the only FedRAMP High and DoD Impact Level 5 platform in a private tenant-managed SaaS environment that can be tailored to y...
Add Favorite
Unraveling Digital Supply Chain Threats...
Attendees of this webinar joined Eclypsium for a discussion around digital supply chain threats, risks, and the hidden challenges that organizations are facing in safeguarding their device supply chains. Some key highlights from this discussion were: The role of Software Bill of Materials (SBOMs) in mitigating vulnerabilities and ensuring supply chain integrity. Practical strategies to tackle supply chain issues head-on, based on eye-opening i...
Add Favorite
Report Card on Risk: Managing Risk in H...
A new generation of faculty and students, technological pressures, rising costs, and emerging risks present a unique set of obstacles for higher education institutions. Watch our on-demand webinar to hear industry experts discuss the risks facing higher education executives today, how an integrated approach to risk management and technology can help manage those risks, and the advantages of leveraging one platform to power innovation and conne...
Add Favorite
Supporting CISA BOD 23-02 with Attack S...
Check out our on-demand webinar with Censys where attendees learned: How to identify CISA BOD 23-02 Understand the risks of remotely accessible management interfaces How Censys found publicly exposed devices
Add Favorite
An Introduction to Advanced Analytics
Watch this Alteryx hands-on-lab for an interactive session on conducting end-to-end analysis. Two Alteryx Sales Engineers, unpacked how federal, state, and local agencies are utilizing data driven approaches to enhance their operations, including reconciliation, risk assessment, and data deduplication. After a brief introduction to the possibilities, attendees get hands-on and learn how to apply the techniques for themselves. Attendees learned...
Add Favorite
AI Driven OSINT for Threat and Risk
In today’s complex threat landscape, organizations are constantly challenged to stay one step ahead of potential risks and threats. This webinar explores the transformative potential of AI-driven Open Source Intelligence (OSINT) in empowering organizations to proactively identify, analyze, and mitigate risks. Watch this on-demand webinar to gain valuable insights into how harnessing the power of OSINT data sources and leveraging machine...
Add Favorite
Scalable Compliance for Small Businesses
What does it mean to be compliant in the world for federal contracting? It means you can follow the government's guidelines and regulations in order to do business with them. It can also entail having the right security clearance and measures in place to secure sensitive data. If your team is unsure if you have the right levels of compliance, this webinar is for you! Join us and our good partner, REXOTA Solutions LLC for this important discussion!
Add Favorite
Safeguarding Your Identity: The Power o...
CrowdStrike’s Identity Threat Protection is a comprehensive solution designed to defend against identity-based attacks and protect agencies and organizations from the ever-increasing risks of identity theft & fraud. Attendees discovered how CrowdStrike, a global leader in cloud-delivered endpoint and workload protection, has extended its expertise to address the critical need for identity protection in today’s digital landscape...
Add Favorite
Back to Search Begin New Search