Back to Search Begin New Search Save Search Auto-Notify
Migrating from a Legacy VPN to a ZTNA S...
Existing solutions based on virtual private networks (VPN) can’t keep pace with the scale of remote users and often lead complicated architectures and a poor end-user experience. Also threat actors know that VPNs are easily compromised – and give implicit access to the underlying network. New security challenges present themselves that traditional remote access solutions weren't designed to solve. To address this new reality, organ...
Add Favorite
Officer Activity Insights & Geospatial...
Police departments have consistently depended on data for public safety and awareness. The Portland Police Bureau is applying data in a manner similar to how sports teams utilize analytics to optimize performance. They employ data to recognize patterns and trends, enhance officer efficiency and innovate new approaches to policing. Attendees of this webinar received an in-depth Q&A with the Bureau's Crime Analyst, Cody Gabbard, which shed l...
Add Favorite
Third Party Risk Management Handled Webinar
During this webinar, we discussed: What all the AI chatter really means - what's possible, what's not, and who should care Whether AI poses an existential cybersecurity threat and how to protect against it How to use today's AI effectively and responsibly - and how to plan for what's next Register to view this on-demand recording.
Add Favorite
Unlock Greater Insights: How Corelight...
During this session, participants discovered how Corelight seamlessly integrates with the Splunk portfolio to enhance incident response times, threat-hunting capabilities, and automated response and remediation processes. Attendees joined us to discover: Insights into how rich network telemetry can provide crucial insights into operational and adversarial activities An understanding of how the limitations of visibility across the environment c...
Add Favorite
Exploring the Evolution of VMware's Por...
The Carahsoft and VMware by Broadcom team discussed: The solutions included in VMware Cloud Foundation The benefits of adopting these technologies The additional solutions that can be added to extend or enhance the core offering Changes to the licensing model
Add Favorite
2024: FAR Part 19, Small Business Programs
Join Washington DC based, Jennifer Schaus & Associates in the 2024 Webinar Series covering The FAR, Federal Acquisition Regulations. This series features guest speakers who will uncover the important details and nuances of The FAR. Get educated about the rules and regulations in the game of federal contracting. This series is COMPLIMENTARY & RECORDED. Recordings are posted on our YouTube Channel. CORPORATE SPONSORSHIPS of this Webinar...
Add Favorite
F5 BIG-IP Next - Explore the Next Gener...
Attendees joined F5 and WWT at the Scott Technology Center on Wednesday, April 3rd for a hands-on lab discussing BIG-IP Next. All BIG-IP users were invited to this personalized training on BIG-IP Next, F5’s Next Generation Platform. During the session, attendees received a first look at the BIG-IP Next platform while going through application deployment exercises to address load balancing, application security, and app access use cases....
Add Favorite
Innovations in Cybersecurity Training f...
Cyber workforce development has never been more essential in the public sector space. With cyber threats on the rise, upskilling employees and filling security positions is critical. Per the National Cybersecurity Strategy, updated in 2023, workforce development training is a directive moving forward. During this webinar, attendees: Learned how OffSec’s proven methodology can help improve your security posture Explored new and innovative...
Add Favorite
Process Mining: An X-Ray for Operationa...
Process Mining is a technique that uses event logs to analyze operational processes, providing a visualization of transactions happening across the organization. It can revolutionize the way you understand how efficiently your organization is operating. ServiceNow's in-platform Process Mining automates the process of looking at your workflows to show you where there are opportunities to make process improvements that drive lasting value. This...
Add Favorite
Election Staffing Governance: Securing...
Provisioning identity security for seasonal election workers presents a myriad of challenges for government election boards and commissions. Managing identities across disparate systems and platforms becomes particularly complex due to the temporary nature of election work. Seasonal election workers, including poll clerks and ballot counters, require access to various electoral databases, polling stations, and voting equipment. Coordinating th...
Add Favorite
Back to Search Begin New Search