180 webcasts found
+ 31 past events found
Back to Search Begin New Search Save Search Auto-Notify
Ready for 2024: How Coordinated Vulnera...
With the 2024 election right around the corner, security and integrity are on your constituents’ minds. HackerOne convened a panel of cybersecurity and election integrity subject-matter experts to give leaders insight into new best practices in coordinated vulnerability disclosure (CVD). During this webinar, we reviewed the success of a recent hacker challenge conducted by the Election Security Research Forum and leading voting technolog...
Add Favorite
Harnessing Compliance as Code: The Futu...
In the fast-evolving ecosystem of the Department of Defense, the way we perceive and manage compliance requirements is undergoing a paradigm shift. Compliance as Code emerges as the frontrunner to challenge traditional, manual vetting methods. Modern practices directly embed these prerequisites into infrastructure and application development processes. This offers the unique advantage of automated evidence collection, streamlining security rev...
Add Favorite
DoD Modernization Through Automation: L...
Attendees learnded how to harness the power of Red Hat automation and Linux technologies to drive modernization efforts within the U.S. Army Corps of Engineers (USACE). These powerful tools can not only automate routine tasks but also enforce the security standards mandated by the Defense Information Systems Agency (DISA). This hands-on on-demand training provided the ability to enhance security posture while streamlining operational processes...
Add Favorite
Mitigating Cyber Threats in Government...
In this on-demand session attendees learned about harnessing the cloud brings for both opportunities and vulnerabilities. This session pivoted around: Showcasing iboss Azure Cloud Security Gateways and its prowess in mitigating cyber threats in the government sector by providing robust Azure infrastructure security. Seamless connectivity to Azure resources and inter-vnet connectivity. Attendees dove into Azure's functionalities, learned about...
Add Favorite
DoDIIS Webinar Series:Transforming Geos...
Traditionally, geospatial analytics has been associated with GIS specialists and specialized systems. However, the landscape is evolving rapidly. With the increasing availability of third-party spatial data, such as satellite imagery, organizations are recognizing the importance of harnessing spatial analysis and incorporating it into their descriptive, predictive, and prescriptive workflows. In our modern, multifaceted world, geospatial data...
Add Favorite
Navigating Tomorrow's Defense Supply Chain
For defense agencies to prepare for and mitigate high-impact supply chain disruptions, decision-makers must first have clear visibility into their operations and where vulnerabilities exist. As a result, more organizations rely on digital logistics, a transformative approach using data analytics to monitor, anticipate and respond to supply chain disruptions. Given the complexities of global supply chains and the ever-present potential for disr...
Add Favorite
Forescout Security Insights Webinar
Nikhil Gupta, Sales Engineer Team Lead, Carahsoft presented an informative and interactive discussion on Forescout policies and a review of all the upcoming Forescout changes on the docket for 2024. During this on-demand session, the following was discussed: New Year, New Policies designed to help you properly collect device information and perform incidence response for any detected high-risk vulnerabilities. 2023 Frequently asked questions a...
Add Favorite
Navigating the Future: What's New with...
Attendees of this on-demand webinar learned how you can simplify and accelerate the delivery of infrastructure and applications. With the tsunami of digital initiatives and new apps, today's infrastructure must support current and future business-critical apps and databases wherever they need to be deployed. Nutanix and HPE partnered to empower government and educational organizations to run legacy, modern, and future workloads, wherever it's...
Add Favorite
Illuminating the Darknet for Government...
Thank you for your interest in this event. Attendees of this on-demand webinar learned how the darknet can be used to: Track illicit sales of drugs, human trafficking, and cyber weapons Detect potential threats and monitor persons of interest Stay one step ahead of foreign Nation-State adversarial activity and attacks Learn the latest tactics, techniques, and procedures of threat actors to better prevent future cyberattacks on critical infrast...
Add Favorite
Migrate, Optimize, and Modernize with V...
Attendees explored the capabilities of VMC on AWS to facilitate faster and more cost-effective cloud workload migration for their agency. They experienced the transformation of applications and infrastructure services using familiar tools and increased scalability. During our in-person workshop, subject-matter experts will review the following topics: Accelerating datacenter evacuations with VMC on AWS Procurement and certifications Customer...
Add Favorite
Back to Search Begin New Search