22 past events found
+ 3 on-demand webcasts found
Back to Search Begin New Search Save Search Auto-Notify
See Concealed Threat Activity Before En...
Threat actors conceal lateral movement and data extraction within encrypted communications, making it incredibly difficult to detect when they are present. Gigamon Precryption™ technology is a breakthrough approach to increasing network deep observability in hybrid cloud infrastructure. Join us to learn how this technology increases deep observability while simultaneously enabling organizations to meet encryption compliance standards. At...
March 13, 2024
Organizer: Gigamon Government Team at Carahsoft
Location: Webcast
Add Favorite
Gigamon Visualyze | Zero Trust Security...
It’s time to look holistically on where we’ve been and where we’re going to secure our future. Join government and industry leaders on Thursday, February 29, for an immersive summit on achieving a secure future by architecting a Zero Trust foundation. The summit, hosted by Gigamon and MeriTalk, will present policy best practices, security successes, practical applications, lessons learned, and next steps on the journey toward...
February 29, 2024
Organizer: Gigamon | MeriTalk
Location: Washington, DC
Add Favorite
Deep Observability: 2 Ways It Transform...
Based on closed-door discussions with over 100 IT executives, Gigamon has created a vision for the future of security and monitoring in the hybrid cloud world. It answers questions like why silos form between IT operations groups (dev, sec and net), why each team’s toolset further builds barriers, how security is the unifying force that’s changing the model, and how the network engineer/architect stays engaged and relevant with pur...
November 9, 2022
Organizer: Gigamon
Location: Webcast
Add Favorite
Deep Dive INSIGHTS: Fighting Ransomware...
Join experts George Sandford, leader of our ThreatINSIGHT Technical Success Management team and Michael Lazic, a member of Gigamon Applied Threat Research as they discuss how ransomware has forced security teams to shift priorities as organizations see ransomware’s potential impacts across the business. In this webinar, they will walk you through: Why the network is critical infrastructure Key reasons network visibility is important Real...
February 9, 2022
Organizer: Gigamon
Location: Webcast
Add Favorite
CISO INSIGHTS: How to Prepare for the R...
Join our distinguished panel of Cybersecurity executives as they discuss why ransomware, extortion, and other attacks are becoming more prevalent and how you can prepare to get ahead of the curve. The panel, moderated by Robert Rodriguez, Founder of SINET, will bring together industry leaders — Nick Shevelyov (CISO, Silicon Valley Bank and best-selling author of Cyber War…and Peace), Edna Conway (VP, Chief Security & Risk Offi...
February 2, 2022
Organizer: Gigamon
Location: Webcast
Add Favorite
The Rise of Ransomware: Planning for Wh...
Think your backups are a panacea for ransomware defense? Think again. Traditional backups are no longer enough and despite ransomware being a popular business model for cybercriminals for years, it’s gaining relevance with supply chain attacks, and big game hunting - attacks on enterprises - are increasing. Graff, JBS, Colonial Pipeline and software manager Kaseya are just some of the businesses held to ransom recently. With Colonial pay...
January 19, 2022
Organizer: Gigamon
Location: Webcast
Add Favorite
Understanding TLS Decryption: Deploy Yo...
The final webinar in our three-part Tech Talk series on TLS Decryption provides practical advice on how to seamlessly deploy a decryption solution to effectively combat malware threats from encrypted traffic.You’ll learn everything you need to know about implementation, including: Planning Validation Integration
November 9, 2021
Organizer: Gigamon
Location: Webcast
Add Favorite
Securing the Hybrid Cloud: 5G Networks
5G networks, almost by definition, are hybrid cloud networks. Any company adopting 5G is in effect adopting a hybrid cloud model. As mobile network service providers launch their 5G services around the world starting with radio access network (RAN) deployment followed by the core network; security vulnerabilities, including preventing or mitigating their effects, are top of mind. Whether the network functions and services are physical, virtual...
July 27, 2021
Organizer: Gigamon
Location: Webcast
Add Favorite
Securing the Hybrid Cloud: Optimizing SIEM
SIEM systems are pivotal to IT organization’s security operations. Many companies are adopting a hybrid cloud model, and cloud-based SIEMs are becoming common as a result. Regardless of on-prem or cloud deployments, the challenges around SIEM remain the same, from data overload, lack of contextual information, to high costs. Security best practices in deploying SIEMs also remain unchanged, which include establishment of use cases, data i...
July 20, 2021
Organizer: Gigamon
Location: Webcast
Add Favorite
Avoiding or Minimizing Ransomware Impac...
In the event of a ransomware attack, security managers must be able to give business-relevant risk recommendations to CEOs and boards of directors. Most of the thought and effort required to do so must take place well before the attack.On this webcast, John Pescatore, SANS Director of Emerging Security Trends, and Benjamin Wright, lawyer and SANS Senior Instructor, will discuss key ransomware issues, including: Key security processes to avoid...
July 14, 2021
Organizer: Gigamon
Location: Webcast
Add Favorite
Back to Search Begin New Search