Ghosts in the Network: APTs, AI and the...
State-sponsored threat actors like those behind Volt Typhoon aren’t relying on zero-days or smash-and-grab exploits—they’re quietly infiltrating critical networks by exploiting public vulnerabilities, using stolen credentials and leveraging built-in system tools to stay undetected for months. These campaigns are designed to evade EDR, avoid raising alarms and exploit blind spots that traditional controls were never designed t...
Secure by Design: Building Resilient Sy...
With global supply chain attacks escalating, nation-state threats targeting critical infrastructure and AI generating code faster than we can secure it, the real challenge isn't avoiding threats—it's building systems that can withstand them. GitLab hosted a webinar on October 2nd for Cybersecurity Awareness Month to tackle the security challenges that keep government CISOs awake at night. During this fireside chat with GitLab's CISO, Jos...
ISC2 SECURE Washington, DC 2025 On-Demand
If you were unable to join us in person, now you can experience the highlights anywhere, anytime. Our ISC2 SECURE Washington, DC 2025 On-Demand curated bundle gives you instant access to leading voices, expert insights and actionable strategies that will help you navigate today’s evolving cyber landscape. Catch up on what you missed and earn up to 6.75 CPE credits.
From Data Chaos to Clarity: How Knowled...
Finding and curating reliable business information is a daily struggle for anyone trying to win customers, understand markets or make a compelling investment case. Between inaccurate sources, scattered datasets and hallucinating LLMs spinning stories from opaque “black box” data, the process is frustrating—and ripe for innovation. This webinar introduced the business knowledge graph: an interconnected database that organizes...
University of Maryland College Park Res...
Attendees joined us for our University of Maryland College Park Research & AI Day, an event designed for all University System of Maryland universities. They heard about how Workspace translates to Google Cloud Platform (GCP), explored Gemini models for research, and learned about grant acceleration and management with Google AI.Attendees: Discover the power of Google Earth Engine for researchHear from experts during a Google for Research...
It's Not the Breach. It's the Spread: I...
This session explored the critical role of cyber resiliency in helping organizations withstand and recover from today's evolving threats. We dove into strategies for reducing attack surfaces, visualizing networks, and securing critical IT assets – while also examining how compliance regulations can enhance security and safeguard sensitive data. During this webinar, attendees:Gain actionable insights to strengthen their security postureLe...
From AI-Curious to AI-Capable: Bridge t...
AI is transforming the modern workplace at an unprecedented pace, as the internet and smartphones once redefined how we work. Microsoft's latest Work Trend Index shows that 82% of leaders agree it is critical to rethink operations with AI, but the gap between AI adoption and workforce readiness continues to grow. As agencies rush to implement AI tools, they are often left wondering where to start, how to effectively use these tools, and how to...
It's Not the Breach. It's the Spread: I...
This session explored the critical role of cyber resiliency in helping organizations withstand and recover from today's evolving threats. We dove into strategies for reducing attack surfaces, visualizing networks, and securing critical IT assets while also examining how compliance regulations can enhance security and safeguard sensitive data. During this webinar, attendees:Learn how to minimize vulnerabilitiesGain actionable insights to streng...
Building Your AI BD Program for 2026
ChatGPT has become a go-to tool for many in GovCon BD, but using it effectively — and safely — is another story. In this webinar, we’ll demonstrate practical ChatGPT use cases for business development, show how to reduce risks around compliance, accuracy, and security, and then compare those results against secure, purpose-built AI solutions designed specifically for GovCon. You’ll see side-by-side examples and walk awa...
Transforming Defense Cybersecurity: Ins...
This webinar brings together Bob Skinner, USAF retired former Director of the Defense Information Systems Agency (DISA) and Commander of the Joint Force Headquarters Department of Defense Information Network and Keith Johnson, Director of Defense Solutions at AWS. Together, they will discuss the Zscaler Trusted Access Gateway (ZTAG) and its role in revolutionizing cyber security within defense environments. Highlights will include how Zscaler...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.