Back to Search Begin New Search Save Search Auto-Notify
Adobe Sign Webinar Series: Embrace Seam...
As organizations across the country continue to operate remotely, digital processes, such as e-signatures, have never been more crucial to an agency's success. E-signatures eliminate the hassle of printing, signing, and scanning documents for streamlined delivery services and reduced delays that come with tracking forms manually. Adobe Sign will have you saving paper and tossing the pen to deliver fast, legal, and secure services through 100%...
Add Favorite
Adobe Flash End-of-Life Webinar Series
Most eLearning content is based on the technology of Adobe Flash, but by the end of 2020, Adobe will stop supporting Flash and Flash Player. View our on-demand webinar series to learn how to transfer your eLearning content over from Adobe Flash and discover the endless possibilities of HTML5! The Road Forward: Using HTML5 as an Adobe Connect Host Adobe Connect is seeing its most significant change to date. Join us to learn more about this exc...
Add Favorite
Adobe Flash End-of-Life Webinar Series
Most eLearning content is based on the technology of Adobe Flash, but by the end of 2020, Adobe will stop supporting Flash and Flash Player. View this on-demand webinar series to learn how to transfer your eLearning content over from Adobe Flash and discover the endless possibilities of HTML5! Conversion Crash Course: Updating Your Materials with Only 4 Months Left If you’re joining this program already in progress, you may not have beg...
Add Favorite
Adobe Sign Webinar Series: Embrace Seam...
As organizations across the country continue to operate remotely, digital processes, such as e-signatures, have never been more crucial to an agency's success. E-signatures eliminate the hassle of printing, signing, and scanning documents for streamlined delivery services and reduced delays that come with tracking forms manually. Adobe Sign will have you saving paper and tossing the pen to deliver fast, legal, and secure services through 100%...
Add Favorite
Elevate Your Threat Hunting Program
The complexity of today's networks and the sheer amount of information being provided has made threat hunting a necessary part of every security program. Discover how ReversingLabs can enrich Splunk data with our industry leading threat intelligence. We will show you how to easily hunt for threats specifically targeted at your organization using our Splunk app which enables quicker malware identification and visualization. During this on-deman...
Add Favorite
Panel Discussion: Zero Trust and the Pe...
The seismic shift to distributed workforces has dissolved the Defense Department’s traditional network perimeter and put a focus on a new critical aspect of cybersecurity: identity management. With users and devices now accessing critical information, systems, and applications from anywhere, the mindset must be to never trust and always verify. In this new environment, a zero trust approach can help agencies minimize their attack surface...
Add Favorite
Creating a Cybersecurity Professional D...
Cybersecurity is a diverse and technically complex profession. Security monitoring, intrusion detection, project management, education, and awareness are just a few skills vital to the modern cybersecurity team. Leaders are struggling to recruit and retain professionals with these critical skills in a market with dramatically increasing demand for talent. This poses a real threat to the continued operation of cybersecurity teams that require c...
Add Favorite
F5 Networks Privileged User Authentication
Join F5 Networks for a webinar where we will discuss how SSH and Web management interfaces for routers, switches, secure telephony administration interfaces, firewall, IDS/IPS, DLP interfaces, storage array interfaces, VDI, and more, can be CAC/PIV/Smart Card enabled using F5 Privileged User Authentication (PUA). Attendees of this webinar will learn: How the F5 PUA provides Single Sign On (SSO) to all administration interfaces, infrastructure...
Add Favorite
ICAM Modernization: Honoring Your Legac...
Government agencies require a higher level of security and user experience than ever before. According to the Office of Management and Budget's updated policy around Identity, Credentials and Access Management (ICAM), agencies are being encouraged to use more flexible solutions, supporting pilots for new authenticators, and requiring the creation of a dedicated ICAM team.The answer? A multifaceted approach, involving access, security, governan...
Add Favorite
Top 5 Security Challenges in Cloud Migration
Security tools are often incompatible or simply not optimized for the cloud or deployment processes. This means that security ends up causing high overhead due to multiple environments requiring unique tools, thus hindering your ability to streamline operations. Security tools may work well in one cloud environment but are too inflexible for the needs of a hybrid cloud. Agencies need adaptable security tools that fit anywhere they build, from...
Add Favorite
Back to Search Begin New Search