11 webcasts found
+ 37 past events found
Back to Search Begin New Search Save Search Auto-Notify
Elevate Your Threat Hunting Program
The complexity of today's networks and the sheer amount of information being provided has made threat hunting a necessary part of every security program. Discover how ReversingLabs can enrich Splunk data with our industry leading threat intelligence. We will show you how to easily hunt for threats specifically targeted at your organization using our Splunk app which enables quicker malware identification and visualization. During this on-deman...
Add Favorite
Turn Your Endpoints Into Defendpoints
Everyone knows that cybersecurity must be a top focus for public sector agencies. The prevalence of attacks - only increasing over the last few years - has offered plenty of new insights into how different endpoints are being targeted. With the growing number of endpoints within agencies, opportunities to break through and compromise systems are extensive. Agencies must ensure that all of their endpoints are completely protected and immune to...
Add Favorite
Genius Machines: Great Power and the Pa...
In the last five years, the tools used in defense have evolved from a staple of science fiction to a real-world magnet for large-scale investment. In Hawaii, that means channeling technological advances for Indo-Pacific security. As the administration's defense strategy has pivoted towards China and great power competition, how is the U.S. matching new capabilities to new strategy, and what needs to happen next?Join Defense One and Nextgov for...
Add Favorite
Adobe Digital Government Technology Con...
Adobe and Carahsoft invite you to join us for the 2019 Adobe Digital Government Technology Conference to discover how Adobe is leading in digital transformation across federal, state, and local agencies. This year's conference will feature sessions geared around digital government and customer experience (CX) best practices through tactical learning tracks covering web modernization, outreach and engagement, forms and document transformation,...
Add Favorite
Improve Your Compliance Posture with Id...
Many modern hybrid enterprises and government agencies are struggling to ensure they have security controls everywhere necessary as well as being able to prove their effectiveness, especially with so many shared privileged accounts. Ever-changing industry as well as government regulations make it difficult to get and stay compliant. In order to reassure customers and the public that confidential data such as credit cards and health records are...
Add Favorite
CyberCast: Secure Remote Access for Adm...
YOU’VE SECURED THE WORKFORCE, NOW SECURE PRIVILEGED ACCESS. Current work-from-home requirements have resulted in organizations enabling entire workforces for remote access. As the FBI and other agencies report, this is a boon for cyber attackers who see this expanded attack surface as a feeding frenzy opportunity. Organizations of all sizes are at increased risk and need to secure remote access for privileged users, whose identities can...
Add Favorite
HPE Insights and Solutions for Enabling...
The COVID-19 pandemic has triggered enormous challenges for government IT, which must support a growing demand for a remote workforce to continue operations while responding to public health and welfare concerns. HPE and Aruba have mobilized the full weight of our respective resources and eco-system of partners to provide technology, solutions, expertise and support to help our government customers with these challenges. Join this webinar and...
Add Favorite
Securing Your Data: The New Currency of...
Data is now currency for nation states, criminal organizations, and bad actors. They all want your data to sell to the highest bidder and your data could hold personal information, state secrets, or proprietary data. Please join Trustwave Government Solutions and learn more about the securing of crown jewels. During this webinar, you will have the opportunity to learn about: Data Security best practices for securing your databases Toxic Combin...
Add Favorite
How Technologically Healthy Are You?
More government employees are teleworking, which can create riskier IT behavior. Cybersecurity attacks are increasing, and the federal government must be vigilant in safeguarding against threats and ensuring a healthy IT infrastructure, particularly during this digitally transformative time. These attacks deprive mission-critical government agencies from their devices, data or internet and can lead to serious consequences, failing entire citie...
Add Favorite
Attack Surface Management: From Reactiv...
As organizations continue to digitize their business and employees are empowered to leverage these capabilities, it’s no wonder security teams struggle to keep track of infrastructure, applications, cloud services and SaaS usage—let alone ensure security policies are adhered to across these environments. The attack surface is dramatically and vastly expanding, and without the proper automation, it is unlikely that security teams wi...
Add Favorite
Back to Search Begin New Search