Public Sector & Healthcare Debriefs: Ex...
Throughout 2020, ransomware increasingly threatened organizations in every industry worldwide – and the threat continues. In the 2021 Global Threat Report, CrowdStrike outlined a vast, interconnected eCrime ecosystem with criminal adversaries existing to support enterprise ransomware operations. Many of these adversaries specialize and work in concert with each other, combining malicious services, ransomware distribution methods and mone...
Using CrowdStrike for Software Savings
Since CrowdStrike collects a vast amount of benign meta-data, there are many non-security use cases you can tap into such as: Enterprise Software usage across the Organization. Identify unused software licenses aka “shelf-ware” to save money Identifying RPA (Robotic Process Automation) tasks across my users. i.e. finding menial and repetitive tasks end-users do and replace them with bots Finding Insights on Application Issues / Cra...
Protecting Our Nation’s Election Infras...
Across the globe, elections are under threat of manipulation and interference. Adversaries increasingly attempt to use offensive cyber operations to directly affect political outcomes. From intelligence collection and “hack and leak” campaigns to election infrastructure targeting, nation-state adversaries around the globe see election interference as a means to advance their national security and political interests. Although diffe...
Tech Talk Tuesdays | Arbor Edge Defense...
One of the biggest threats to maintaining Continuity of Operations is a DDoS attack. Tom will discuss: (1) the evolution of modern DDoS attacks; (2) technical vulnerabilities of on-premise devices such as VPN gateways, firewalls and application servers to DDoS attacks; and (3) demonstrate the technical features of Arbor Edge Defense that enable it to be the first and last line of an automated perimeter defense
Tech Talk Tuesdays | Enhancing Visibili...
The flexibility and ease of deployment of SD-WAN has accelerated its deployment as new network edges emerge for large enterprise and government entities as MPLS continues to be prevalent within the Federal ecosystem. Tory will discuss: (1) Remote site monitoring solutions for MPLS; (2) Utilizing vSTREAM Family of Virtual Appliances for maintaining visibility in SD-WAN environments; (3) Deployment options for vSTREAM within uCPE of SD-WAN or Pu...
Stop your Firewall from Burning: How to...
Today, even the largest purpose-built security appliances can't decrypt all SSL/TLS traffic without impacting network performance. And with encrypted traffic increasing significantly, you have an inspection gap that limits the effectiveness of many security features. If you virtualize the security stack, you create an architecture that is completely flexible to the features and inspection you need. But, it must be turnkey so you can streamline...
Tech Talk Tuesdays | Cloud Migration
Cloud migration is a complex endeavor for even the most experienced of IT professionals. Patrick will discuss: (1) The AWS “Well Architected Framework” whitepaper; (2) How Smart Data and NETSCOUT Threat Intelligence Solutions can help improve operational efficiency, lower costs, improve performance, and build Security into any Cloud environment; and (3) technical best practices for monitoring cloud migrations and cloud implementations.
Tech Talk Tuesdays | Monitoring VDI Env...
The Virtual Desktop Infrastructure continues to evolve its mission critical application status as organizations of all types realize the importance of enhanced user mobility and remote access. Paul will discuss: (1) Common challenges of access; poor user experience; and application issues; (2) How to use network visibility to understand and manage your VDI environment; and (3) Best Practices for Instrumentation.
LA County Elections Goes Digital with N...
LA Country Registrar-Recorder/County Clerk’s Office embarked on an aggressive path to improve the voter experience for over 5.4 million registered voters spanning 4,100 square miles and 13 different languages. Named “Voting Solutions for All People” (VSAP), this initiative brought over 30,000 digital ballot marking devices and 8,000 digital pollbooks to be deployed across nearly 1,000 voting centers. Learn how Cherwell helped...
Defending Your New Perimeter from Next...
It is more important than ever to protect the availability of networks, security and application infrastructures to maintain continuity of operations. As government employees and contractors are continually accessing job essential applications from remote locations, new vectors of attack are emerging. One of the biggest threats to maintaining continuity and continuity of operations is a DDoS attack. Join Tom Bienkowski, Director, Product Marke...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.