84 webcasts found
+ 38 past events found
Back to Search Begin New Search Save Search Auto-Notify
AI Driven OSINT for Threat and Risk
In today’s complex threat landscape, organizations are constantly challenged to stay one step ahead of potential risks and threats. This webinar explores the transformative potential of AI-driven Open Source Intelligence (OSINT) in empowering organizations to proactively identify, analyze, and mitigate risks. Watch this on-demand webinar to gain valuable insights into how harnessing the power of OSINT data sources and leveraging machine...
Add Favorite
Safeguarding Your Identity: The Power o...
CrowdStrike’s Identity Threat Protection is a comprehensive solution designed to defend against identity-based attacks and protect agencies and organizations from the ever-increasing risks of identity theft & fraud. Attendees discovered how CrowdStrike, a global leader in cloud-delivered endpoint and workload protection, has extended its expertise to address the critical need for identity protection in today’s digital landscape...
Add Favorite
Federal Policy for Supply Chains What's...
Executive branch policies and Congressional legislation indicate a growing priority for "whole of nation" supply chain resilience. Continuous supply chain monitoring & risk analysis is not just mandated, it's proving to be a critical & necessary strategic deterrent. Federal supply chain policy (Section 8...81) was established to minimize risk in information and communications. Congress is now proposing draft legislation to expand poli...
Add Favorite
Automate Evidence Collection: Manage Cy...
Is your GRC strategy enabling information security activities within your organization? Today's audit and compliance practices require time and resource-intensive information-gathering techniques that produce static and “point in time” results. Organizations can streamline information and evidence gathering by leveraging existing system data, creating objective evidence, maintaining compliance, and reducing risk. Join us for an inf...
Add Favorite
Catch A Hacker
Armis, Gigamon and Carahsoft completed a hands-on experience in the Armis platform, which will help you understand the ease of use, simplicity, and business value for your organization when responding to critical cyber incidents. The session dove into the intersection of Operational Technology (OT), Internet of Things (IoT0, and Internet of Medical Things (IoMT). In the face of such critical challenges, the Armis platform aligned with Gigamon'...
Add Favorite
The Fundamentals of Application Securit...
As the nine time Gartner Magic Quadrant Leader, the Veracode team will touch on the best practices that have assisted many of their existing customers during this four-part webinar series. Upon completion of all four parts, you will be awarded a VeraTrack Education Certificate. In order to receive the certificate, you may either attend the live sessions, or view the on-demand recordings. View the full agenda and register for all four sessions...
Add Favorite
Assess Your Threats: How Agencies can A...
Knowing what's happened in the past can help your agency better anticipate and plan for stronger security, resilience, and outcomes in the future. OnSolve recently introduced Risk Insights, the first-of-its-kind solution for generating historical physical threat reports to identify top concerns based on actual data. Risk Insights helps government agencies identify critical event trends from the past so they can anticipate what may impact t...
Add Favorite
FedRAMP Rev 5 is a BIG DEAL Are You Ready?
The FedRAMP Authorization Act signed by the president in January 2023 made FedRAMP the law of the land. If you are a cloud services provider or software company that wants to sell to the U.S. federal government, it is critical that you have a current FedRAMP authorization. The good news is that FedRAMP Rev 5 with support for OSCAL (Open Security Controls Assessment Language) is now available and could make achieving FedRAMP faster, easier, and...
Add Favorite
Risk Intelligence: Proving Your Cyberse...
Cybercrime is evolving at the speed of innovation, sometimes outpacing the progress of cybersecurity. Cybercrime often has the advantage as it is highly motivated and not bound by the many required compliance and regulatory mandates that businesses face. Threat intelligence can be a useful ally, enriching the process of audit and assessment, and providing proof of security controls and policy enforcement that is required for security and comp...
Add Favorite
Migrating your GRC: Go from Legacy to L...
Join experts from Templar Shield and Workiva for a lively discussion! Are legacy governance, risk, and compliance (GRC) tools increasing your costs and hindering your ability to innovate? Discover exciting, cost-effective, cloud-based alternatives as we provide timely updates and tangible advice. We’ll address the challenges and highlight the opportunities, including: The Forces of Change: Learn about the drivers that are compelling org...
Add Favorite
Back to Search Begin New Search