Back to Search Begin New Search Save Search Auto-Notify
Navigating the BootHole Mitigation Process
Eclypsium researchers recently disclosed an arbitrary code execution vulnerability in the GRUB2 bootloader that can bypass Unified Extensible Firmware Interface (UEFI) and OS Secure Boot, impacting other OS defenses. In this webinar, John Loucaides, VP of Research & Development at Eclypsium, will help government agencies understand how to navigate the complex process of mitigating the GRUB2 BootHole vulnerability - without inadvertently ma...
Add Favorite
Improve Public Access to Research Results
Research and development spending - including federal funding - has reached record highs and is continuing to grow. This growth is leaving agencies concerned about the administrative burden that results from federal mandates that require making publicly funded research outputs findable, accessible, interoperable and reusable. Last year the Government Accountability Office (GAO) published a study titled "Additional Action Needed to Improve Acc...
Add Favorite
Leverage Advanced Management and Securi...
With Adobe Document Cloud (DC), agencies across the nation are turning manual document processes into efficient digital ones. Adobe Acrobat DC and Adobe Sign empower agencies large and small to work with confidence, knowing that all PDFs and e-signature workflows are safe and sound through management features and security protocols -- all customizable to your organization's needs.Join our complimentary webinar to discover how your team can tak...
Add Favorite
Bottom Up and Top Down: A Layered Appro...
Office 365 makes it easier than ever for your users to collaborate and meet your mission, but creating granular settings to police access to Teams and the sensitive data stored within them can be challenging for IT teams. This is especially true for government agencies with centralized Office 365 deployments where IT must effectively enforce Teams membership and configurations without impacting non-sensitive collaboration. Locking down your wo...
Add Favorite
Mitigating Business Email Compromise an...
Email fraud leads to two main threats - one is Business Email Compromise (BEC) where attackers pretend to be you; the other one is Email Account Compromise (EAC) where attackers become you. BEC/EAC scams have cost the victimized organizations over $26 billion since 2016. What they have in common is that they both target people.They both rely on social engineering and are designed to solicit fraudulent wire transfers or payment. Unlike malware...
Add Favorite
Orchestration & Automation for Lockheed...
Security and IT Ops teams are working hard identifying, analyzing, and mitigating threats facing their organizations. Splunk gives you the full power of orchestration, automation, and response to executing actions in seconds, not hours. Join us to learn how Splunk Phantom can help your team achieve optimum security and IT operations regardless of what security tools or SIEM you're using. Through Splunk Phantom, users will be able to leverage t...
Add Favorite
Go with the Flow - Building Sustainable...
Security teams are working hard identifying, analyzing, and mitigating threats facing their organizations. Splunk Phantom allows you to harness the full power of your existing security investment with security orchestration, automation, and response. With Splunk Phantom, you can execute actions in seconds, not hours. View our on-demand presentation and demo with Splunk and SGT on the power of Splunk Phantom's workflow engine. During the presen...
Add Favorite
Adobe Experience Makers DHS Workshop Series
Government agencies are rebuilding their digital experiences with citizens and employees in mind. Through innovative and reliable programs, Adobe has been assisting in these efforts by offering solutions that increase efficiency and deliver memorable experiences to citizens, all while protecting confidential data and information within the public sector.Join us for just one or all three of these on-demand webinars in this Department of Homelan...
Add Favorite
Achieving Mission Success Using Search-...
Siren and Carahsoft are excited to invite you to join us in our DoDIIS 2022 webinar series to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Electronic data sources in national security missions are increasingly more disparate, complex, and dependent on specific platforms. Intelligence analysts are overwhelmed by the number of existing and new data sources. Withou...
Add Favorite
DoDIIS 2022 Webinar Series: SecOps Auto...
VMware SaltStack SecOps is a VMware vRealize Automation add-on that delivers continuous compliance and vulnerability remediation with the power of SaltStack Config automation. With SaltStack SecOps, security and operations teams can work together to define a corporate IT security policy, scan systems against it, detect vulnerabilities and non-compliance issues, and actively remediate them - all from a single platform. Attendees of this webinar...
Add Favorite
Back to Search Begin New Search