Back to Search Begin New Search Save Search Auto-Notify
Zimperium & SD Times- Top Five Best Pra...
It’s 2022, which means any organization that builds or maintains a mobile application, either for end-users or for employees, knows they have a responsibility to secure those applications. However, between fixing privacy, security and compliance risks in the development process and enabling protection from the many different threat vectors while in use, it’s hard to know where to start. Join SD Times for a live webinar to hear from...
February 17, 2022
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
Zimperium- Top 5 Risks to Address in th...
Even though there are similarities on how web and mobile apps are used, the risks that mobile apps can pose to an enterprise are fundamentally different. Some risks arise during development and others once the application is published. With multiple solutions needed at different points in the application life cycle, DevSecOps professionals find themselves wondering where to begin and which stages of the software development lifecycle they shou...
November 4, 2021
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
How to Improve Federal Mobile Security...
The Federal Mobility Group (FMG), established by the Federal CIO Council, was tasked with improving cybersecurity, governance, and accountability for federal mobile device usage and programs. Co-chaired by mobile leaders from DHS, GSA, and NIST, the FMG sponsors a Federal Information Security Modernization Act (FISMA) Mobility Metrics Working Group (FMMWG) that is focused on updating the FISMA mobility metrics for fiscal year 2022 and beyond....
October 21, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Zimperium- Discover How to Protect Your...
A new variation of the aggressive mobile spyware known as Pegasus, has recently attacked over 50,000 individual mobile devices in 50 countries. Also unforeseen, was Pegasus making more than 1.65 billion Apple* products (in use, worldwide) vulnerable since at least March this year (Zimperium customers are already protected). CISOs and their teams need to know how to protect their mobile endpoints, and ultimately their whole organization, from P...
October 14, 2021
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
International Wireless Communications E...
For over 40 years the IWCE has been North America's premier critical communications event. It is the one place where critical communications technology professionals gather to evaluate, learn and network with industry leaders.  Our mission is to connect the Critical Communications ecosystem through education, networking and insights to help professionals leverage emerging technologies to create a safer, more efficient and more interconne...
September 27-30, 2021
Organizer: Informa
Location: Las Vegas, NV
Add Favorite
CarteCon Online | FREE Skill Building,...
Critical assets like roads, bridges, water mains, and school facilities are near failing. Your organization is battling years of underinvestment. But your team says, "Bring it on." You're ready to think bigger, work smarter, and use data to improve lives in your community.Infrastructure is more than iron and steel. It's how we physically express our culture and values, improve access to education and jobs, empower development, and protect our...
September 14-16, 2021
Organizer: Cartegraph
Location: Webcast
Add Favorite
Zimperium: How to Protect Your Enterpri...
How to Protect Your Enterprise Against the Pegasus Attack Best practices from detecting & defeating the spyware since 2016 August 5, 202111am EDT / 4pm UTC+130 Minutes According to recent reports, mobile devices of 50,000 individuals from 50 countries have been under attack by a new variation of an aggressive mobile spyware known as Pegasus. Enterprise security professionals need to know how to protect their mobile endpoints, and ultimatel...
August 5, 2021
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
From Zero Trust to O365: IT Leader's Gu...
For years, financial services organizations have been using mobile devices to enable productivity and improve customer service. With the reliance on the remote workforce over the last year, mobile devices have become even more critical for everything from Zero Trust to providing distributed access to Microsoft O365.But the shift to mobile has also created security and compliance risks that need to be addressed.Tune in for a special fireside c...
June 30, 2021
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
Create Engaging Digital Communications
Effective communication relies on visuals to make a lasting impression, and including images with information-rich text is proven to capture the attention of your target audience. Local governments and federal agencies are under pressure to create timely, easy-to-understand communications about current events, including COVID-19. Join our complimentary webinar to learn how Adobe Stock delivers engaging experiences to both citizens and employee...
June 30, 2021
Organizer: Adobe Government Team at Carahsoft
Location: Webcast
Add Favorite
The Journey to Zero Trust: Start with P...
A successful Zero Trust model enforces continuous authorization by verifying anyone and everything connected to an enterprise system. We’ve seen in recent headline news that little to no control on identity management can be detrimental if attackers gain access to accounts with elevated privileges. How can government agencies implement an effective Identity Security model to minimize risk and keep pace with adversaries? What are best pra...
June 24, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Back to Search Begin New Search