Choosing the Right Mobile App Security...
In today's rapidly evolving digital landscape, securing mobile applications is more critical than ever for enterprises. As cyber threats become increasingly sophisticated, organizations must carefully consider their approach to mobile app security. Should they adopt a comprehensive platform solution or opt for best-of-breed tools tailored to specific needs?Join us for an insightful webinar with GigaOm’s Howard Holton. We will explore th...
GE3 | Government Experience, Engagement...
Discover the latest innovations from government leaders and industry experts. The GE3 seminar for government professionals focused on Experience, Engagement, and Enrollment, the three Es of engaging stakeholders and audiences, building subscribers, driving adoption, and enrolling customers in benefits programs. The summit takes a deep dive into the elements of creating and successfully engaging a community — technologically, analytically...
Turning Technological Advantage Into Ba...
The spotlight is on artificial intelligence (AI) and its role in shaping the future of defense strategy and operations. In this session, you’ll hear from Igor Jablokov, CEO and founder of Pryon and the AI visionary whose previous venture became the foundation for Amazon’s Alexa. Igor and his team at Pryon have been at the forefront of AI innovation, advocating for responsible AI development and pioneering secure AI deployments to s...
Insider Risk Programs: Three Truths and a Lie
In this webinar, Everfox Director of Enterprise User and Data Protection, Michael Crouse, shares insights on why insider risk management is not about cyber controls and checklists that only show what occurred without indicating why. Insider risk sits at the junction of organizational and technical controls where an insider risk management plan must address the needs of the program before, during and after critical events, not just during incid...
From Data to Decisions: Secure Controll...
Explore the critical role of Multi-Enterprise Spanning Architecture (MESA) in helping to enable controlled collaboration and securing sensitive information across mission partners.
Countering Advanced Threats in a Rapidl...
Today’s adversaries are more sophisticated and agile than ever before, utilizing rapidly changing tactics to exploit vulnerabilities. Within mere minutes, adversaries can move laterally across a network, making it critical for defense agencies to adopt proactive, layered approaches to security. The integration of advanced threat intelligence and robust threat hunting capabilities is key to detecting, disrupting and stopping these threats...
Join Us at the Cyber Range: Building a...
Join Chuck Reynolds, founder and CTO of Technical Systems Integrators, Inc. (TSI) and Dominic Perez, CTO for Curtiss-Wright Defense Solutions for this educational webinar to learn how organizations are staying ready, learning new technologies and reducing downtime by implementing Cyber Range as a Service. From the cloud, to your data center, to the tactical edge, we’ll show you how you can spin up realistic network training environments,...
Resilient and Camouflaged Communication...
In high-stakes environments, secure and reliable communication can mean the difference between mission success and failure. Join Dominic Perez, CTO of Curtiss-Wright Defense Solutions and Timothy Hillner, CTO of Fairwinds Technologies, as they delve into advanced strategies for ensuring resilient communications for forward deployed teams. This webinar will explore innovative approaches to safeguard data and maintain connectivity, even in hosti...
Secure Access, Trusted Intelligence: Tr...
Rapid, accurate access to real-time data is critical for decision dominance in today’s ever-evolving threat landscape. Military and government personnel need new ways of keeping pace with the digital landscape. Open-Source Intelligence (OSINT) and Artificial Intelligence (AI) are critical sources for uncovering insights and staying ahead of the adversary. However, that nature of OSINT and AI means the data and the systems they stem from...
Securing IT/OT Convergence: Lessons fro...
The convergence of IT and OT within the Department of Defense (DOD) and the federal government presents unique cybersecurity challenges, particularly in protecting critical infrastructure and industrial control systems. As highlighted in the latest CrowdStrike Global Threat Report, adversaries are increasingly targeting operational technology environments, exploiting vulnerabilities in industrial control systems and the Extended Internet of Th...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.