237 webcasts found
+ 13 past events found
Back to Search Begin New Search Save Search Auto-Notify
Mitigating Risk with Proper Certificate...
Outages due to certificate issues – such as certificate expirations – can have a costly impact to business, including loss of revenue, decreased customer satisfaction, and a negative impact to brand reputation. Watch this on-demand webinar to hear the stories of a large manufacturer and a large bank who have been able to mitigate these risks by using ServiceNow for certificate management. With these customers using Entrust for the...
Add Favorite
Straight Up Security with Palo Alto Net...
Nutanix took attendees through their hybrid cloud journey and showed how Palo Alto Networks can help secure their hybrid cloud environments. VM Series integrates with Nutanix Flow, augmenting Flow’s ability to control traffic with advanced threat prevention capabilities. View this on-demand webinar, to learn how to: Reduce the attack surface to detect and stop threats trying to penetrate the security perimeter Deliver seamless, consisten...
Add Favorite
AWS Security Webinar: The Key to Effect...
It’s essential to protect your private data at all times, especially when you don’t control all the hardware and software components with access to that information. Encryption is a powerful way for organisations to maintain an appropriate level of data confidentiality and integrity. AWS offers many options for using encryption to protect your data in transit and at rest. A variety of features let you determine how much control you...
Add Favorite
Google Cloud 2020 Webinar Series: Secur...
Google Cloud and Carahsoft invite you to a webinar to learn more about cybersecurity solutions and demonstrate specific use cases. Government agencies continue to modernize by expanding their services and migrating workloads to hybrid and cloud environments. These actions create rapid growth in the volume of log data generated by devices and systems. Security professionals rely on these logs for audit information, forensic evidence, and to det...
Add Favorite
Go with the Flow - Building Sustainable...
Security teams are working hard identifying, analyzing, and mitigating threats facing their organizations. Splunk Phantom allows you to harness the full power of your existing security investment with security orchestration, automation, and response. With Splunk Phantom, you can execute actions in seconds, not hours. Join Splunk and FCN for an on demand presentation and demo on the broad strokes of Splunk Phantom's automation engine. During th...
Add Favorite
Cofense's Security Trends: 2020 and Beyond
Join us as Cofense security expert, Andy Spencer, shares the latest insights on which phishing and malware threats you should be prepared for and ready to combat. As the threat landscape continues to evolve at a rapid pace, with new threat vectors emerging and increasing in sophistication, Andy will share a more in-depth perspective of what to expect through the remainder of 2020 and beyond. Between the Cofense research teams and their Phishin...
Add Favorite
Security, Visibility and Management for...
Government agencies are utilizing Micro-Service Architecture (MSA), the predominant design pattern for application development, but these evolved patterns have introduced new challenges and complexities to understand. James Harmison, a senior solutions architect at Red Hat with over a decade of experience in operationalizing applications for enterprise use, addressed: The concerns that teams have as they try to deploy MSA applications into pro...
Add Favorite
Qmulos Webinar Series: NextGen Compliance
Curious about how Qmulos can help your organization? View this on-demand webinar series where we will discuss a variety of topics ranging from CMMC certification, big data, security assessment automation, compliance, and more. This series will provide a wide overview of how you can leverage your data, gain real-time insights, and make smarter business decisions within your agency. Security Assessment Automation: During this session, you will d...
Add Favorite
Elevate Your Threat Hunting Program
The complexity of today's networks and the sheer amount of information being provided has made threat hunting a necessary part of every security program. Discover how ReversingLabs can enrich Splunk data with our industry leading threat intelligence. We will show you how to easily hunt for threats specifically targeted at your organization using our Splunk app which enables quicker malware identification and visualization. During this on-deman...
Add Favorite
Protect Your Controlled Unclassified In...
Classified Unclassified Information (CUI) is the path of least resistance for adversaries, and loss of aggregated CUI is one of the most significant risks to national security. Protecting your CUI is the most critical data protection topics for 2021. If your agency is only using encryption of data-at-rest (db) and encryption of data-in-transit (SSL); you are significantly exposed when your data is utilized and displayed within your apps. Your...
Add Favorite
Back to Search Begin New Search