Back to Search Begin New Search Save Search Auto-Notify
Empowering the DOD Secure Workforce wit...
Palo Alto Networks Prisma Access DOD protects hybrid workforces with the superior security of ZTNA 2.0, while providing exceptional user experiences from a simple, unified security product. Purpose-built for cloud-enabled DOD agencies, Prisma Access DOD consolidates multiple point products into a single integrated service, reducing complexity while increasing organizational agility. With a common policy framework, consistent visibility, single...
Add Favorite
Protecting the 2024 Election: Be Prepar...
After the events of the past few years, security is in the forefront of election officials’ minds. The individual states are responsible for conducting elections, so the National Association of Counties (NACo) at its annual legislative conference just conducted a series of workshops and panels on the range of threats facing election workers and voters alike. While physical threats, intimidation and harassment are primary concerns, there...
Add Favorite
Microsoft Speed Data-ing Series
Watch our enlightening on-demand webinar as we explore the transformative power of AI and data analytics within the United States Department of Defense (DoD). In collaboration with Azure OpenAI, our AI Studio initiative empowers warfighters by alleviating cognitive burdens through innovative tools. We delve into the advantages of deploying an 'assistant' that facilitates conversations with private or domain-specific data, harnessing the capabi...
Add Favorite
Deciphering CMMC 2.0 Timelines & Milestones
During this webinar, we covered the latest CMMC 2.0 timelines, delivered expert insights, and showcased advanced techniques that will empower organizations to achieve CMMC 2.0 while improving their business operations. We helped prepare businesses for a future of security, success, and unparalleled opportunities in defense contracting! In this webinar, we covered: The CMMC 2.0 Overview Navigating the Timeline Risk Management The Proactive Appr...
Add Favorite
Navigating OT Security in the DoD
Attendees of this webinar gained insights on: Current threats that result from converged IT/OT operations Recent OT security legislation and impacts on the DoD The unique use cases for OT security in the DoD Tips and mitigation strategies for managing OT security threats
Add Favorite
Dual-Use Technology: Accelerating Capab...
In an era where technology advancements are both rapid and revolutionary, distinguishing between civilian and military applications poses significant challenges and opportunities for national security, foreign policy, and global technological leadership. This webinar delved into the intricacies of dual-use technology, spotlighting the urgent need for innovative approaches to identify, regulate, and leverage these technologies in bolstering sec...
Add Favorite
Sea-Air-Space 2024 Webinar Series: Fort...
Thank you for your interest in our Sea-Air-Space 2024 Webinar Series, Ivanti Session: Fortifying DoD Networks with CAASM & Patch Management Attendees of this webinar learned how Ivanti can help your organization: Implement a risk-based approach for vulnerability prioritization and patching in DoD and Federal networks Incorporate vulnerability management processes through automation Enable better collaboration between IT and security stakeh...
Add Favorite
Roadmap to DoDD 8140.03M Compliance: A...
With the release of new DoDD 8140.03M, compliance remains a top concern for agencies. In a dynamic and rapidly changing cyber landscape, it's never been more important to stay ahead of the curve. While it’s no easy task to navigate, early implementation and strategic planning are critical to the nation’s security. WillCo Tech offers trusted cybersecurity expertise management, equipping the DoD workforce with the largest cybersecuri...
Add Favorite
Back to Search Begin New Search