SteelCloud: RMF Acceleration through eM...
Join Brian Hajost, COO of SteelCloud, as he shows you how you can accelerate RMF, keep eMASS up to date and ensure compliance through automation. In this webinar you will learn how to: Automate and reduce the effort and errors in merging non-technical data with machine-generated technical data Automate and simplify the production and input of compliance data into eMASS Automate and reduce the effort to produce, name, and store fully populated...
Hyperscience 101 - Human-Centered Automation
Every day, government agencies must process millions of applications, claims forms, tax documents and other pages to respond to constituent requests and keep operations running. To keep up with demand, government agencies are upgrading their existing document process workflows with the latest in AI-powered automation. Forward-thinking agencies at all levels are looking beyond OCR, RPA and other legacy technologies and turning to intelligent a...
2021 Cyber Year in Review & 2022 Predictions
While adversaries continued their malicious activities during the COVID-19 pandemic, the trend line maintained its growing trajectory throughout 2021. Adversaries demonstrated continued growth in intrusion campaigns, eCrime, and other malicious activity that continually challenged cybersecurity personnel across the globe. Attend this session to hear insights from CrowdStrike’s leading experts as they reflect on 2021, discuss potential tr...
Tech Talk: All the Fixings with Identit...
Just like the best holiday meals, our shared partnerships and technologies come together for a complete offering. Join the December Tech Talk as we showcase how CrowdStrike and Okta combine best-in-class solutions for identity management and endpoint security. This partnership simplifies remote access for trusted users and devices, centralizes visibility, and supplies critical user and device context to access requests. You get the data-driven...
Tech Talk: All the Fixings with Identit...
Just like the best Thanksgiving meals, our shared partnerships and technologies come together for a complete offering. Join the November Tech Talk Tuesday as we showcase how CrowdStrike and Okta combine best-in-class solutions for identity management and endpoint security. This partnership simplifies remote access for trusted users and devices, centralizes visibility, and supplies critical user and device context to access requests. You get th...
eCrime Social Engineering Operations
eCrime actors have continually sought to capitalize on current events, human emotion, and sensitive data to manipulate real human behaviors as part of a cyber attack. This brief will cover the necessary circumstances and infrastructure used in recent social engineering techniques to lure past victims – including public sector and educational institutions – into providing information or performing actions that support financially-mo...
Financial Close and Consolidation with...
Many state and local entities are required by law to submit a comprehensive annual financial report which serves to provide the public a detailed accounting of all taxpayer funds collected and expended, along with transparent presentations of budget to actual comparison statements. Timeliness, along with the need for reliability, are among two of the most important characteristics when it comes to financial reporting and often require years of...
Connect-the-Dots Between Today and a Ze...
First defined over two decades ago, zero trust has substantially picked up steam in recent years. President Biden’s Executive Order on Improving the Nation’s Cybersecurity has taken it a step further by codifying zero trust as the Federal Government’s security architecture of choice. Nearly every agency desires to achieve zero trust, but the gap between their existing environments and the ideals they read about leave most st...
CrowdStrike Tech Talks-Security and Com...
Join the September Tech Talk and learn more about how to omply with critical security requirements. CrowdStrike and AWS can aid your compliance efforts with continuous monitoring to help ensure you meet security and compliance standards for education, healthcare, government, and beyond. Inherit the latest security controls operated by AWS, strengthening your own compliance and certification programs. Join this webinar and learn how...
Nation-State Threat Landscape Overview: Iran
This brief will cover the current geopolitical climate with Iran and how the current climate is influencing cyber operations from the Iranian regime. It will contain an overview of malicious cyber threat actors, their associated malware, infrastructure, and TTPs, as well as mitigation strategies to ensure your enterprise is protected.
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.