92 webcasts found
+ 115 past events found
Back to Search Begin New Search Save Search Auto-Notify
Mobile Security Posture at the Departme...
Developing mobile applications is difficult and fraught with challenges. The solution? Finding the best app security testing abilities to help ensure mobile app development efforts are in line with Federal requirements and standards. NowSecure analyzes and continuously monitors mobile apps for security, privacy and compliance issues, scoring the risk with actionable information to help agencies protect themselves from mobile risks in their mob...
Add Favorite
Democracy Goes Digital: The One Thing T...
During this webinar, attendees will learn: How to detect both internal and external actors in voting systems Novel approaches to threat detection and response that can be deployed easily The detailed threat intelligence you will receive in real time about actors threatening election systems
Add Favorite
Introduction to Advanced Analytics with...
Join Alteryx for an interactive session on conducting end-to-end analysis. To start off, we will unpack how federal, state, and local agencies are utilizing data driven approaches to enhance their operations, including reconciliation, risk assessment, and data deduplication. After a brief introduction to the possibilities, you'll go hands-on and learn how to apply these techniques for yourself. You will learn how to bring in and merge differe...
Add Favorite
Introducing Cirrus by Veeam - BaaS for...
In this on-demand webinar, attendees learned more about Cirrus by Veeam, the #1 backup software for Microsoft 365 now as a service. During this session, attendees saw: Backup as a Service for Outlook Emails, Calendars, and Contacts, OneDrive for Business, SharePoint Online, and Teams Chats and Channels. Granular Role Based Operator and Self-Service recovery Simplified Administration with Unlimited Storage and Retention
Add Favorite
Automating Governance, Risk, and Compliance
Attendees of this on-demand webinar learned GRC strategies including: NIST, CMMC, and BOD Lifecycle Management Automating Cybersecurity Risk Management and Compliance Modernizing Risk Assessments Managing technology assets in your agency
Add Favorite
From NIST to OMB: Better Manage a Compl...
The Compliance Essentials for Splunk (CES) app can assist your organization by continually monitoring your compliance posture across various control frameworks like NIST Risk Management and OMB M-21-31. The Splunk CES app gives you a way to quickly and easily visualize your compliance posture in a collection of easy to read dashboards, with searches running in near real time to ensure your organization conforms with the selected control family...
Add Favorite
Federal Software Security Compliance wi...
In response to the critical need for fortified software supply chain security within U.S. Federal Government Agencies, compliance with Executive Order 14028 Section 4(e) is crucial. From detailed software analysis to secure SBOM sharing, this webinar was the gateway to embracing a proactive and resilient approach to software security compliance in alignment with federal mandates. Attendees learned more about the specific requirements and impl...
Add Favorite
Alteryx and Plante Moran: Supercharge Y...
During this on-demand webinar with Plante Moran's data analytics experts attendees gained practical insights and real-world examples on enhancing internal audit processes through technology. Attendees discovered actionable solutions and viewed impactful dashboards showcasing time and cost savings. Download to learn recommendations for setting the stage for technology application, adopting a risk-oriented mindset, and effectively managing organ...
Add Favorite
Streamlining Identity Hygiene & Access...
During this on-demand webinar, attendees learned how RSA Governance & Lifecycle enables agencies to: Reduce identity risk by providing centralized visibility and control of all user accounts and access. Maximize time and dollar investments with existing providers while enhancing the organization’s security posture. Streamline compliance by identifying Segregation of Duties violations, auditing all identities and access permissions,...
Add Favorite
Embracing A Data-Driven Approach To Cyb...
Understanding what devices exist in your environment is the foundation to security. Identify compliance gaps and risks for all IP connected assets regardless of if they are managed or unmanaged. Where are you today with your Asset Management mission? Allow Armis to provide you real-time visibility and control over every asset connected to your network. The overview of the platform focused on: Discovering and managing an accurate, unified and...
Add Favorite
Back to Search Begin New Search