Back to Search Begin New Search Save Search Auto-Notify
Putting MITRE ATT&CK Into Action
Utilizing compromised or fraudulent credentials are a disproportionate hot spot in threat reports. So, it makes sense to look for that in your threat hunting. But where do you start? The answer is MITRE ATT&CK. In this session, Exabeam will close the loop between MITRE ATT&CK TTPs and deep analysis of security events to recognize malicious activity that is difficult to distinguish from innocent day-to-day operations. Join us for this o...
Add Favorite
Validate Cloud Migration Plans with Wor...
Join our Virtana webinar to learn how Cloud Migration Transformation success depends on plans distilled into insights and answers to your questions before, during, and post migration. In this webinar, you will learn how to: Estimate and compare cloud networksExecute full-stack workload performance tests in the cloud De-risk your migration plans by analyzing targeted applications and infrastructure dependenciesCompute storage cost while augment...
Add Favorite
DevSecOps in a Mission-Critical Environment
The Joint Strike Fighter (JSF) Program is the Department of Defense's focal point for defining next-generation strike aircraft weapon systems for the Navy, Air Force, Marines, and our allies. As the operational tempo has evolved, the requirements of the fleet have the need to develop a new approach to software development and sustainment. This approach is Software Modernization, an effective hybrid of development and sustainment that involves...
Add Favorite
How to Deliver NIAP Compliant Mobile Ap...
The National Institute of Standards and Technology has partnered with the Department of Defense and several federal agencies to create a standardized mobile app vetting process for the National Information Assurance Partnership (NIAP) compliance. In 2019, NowSecure partnered with the U.S. Air Force to kick off the creation of an automated software security testing solution to enable NIAP compliance for mobile apps. This is an easy-to-use solut...
Add Favorite
Reducing Teleworking Risks with a Softw...
Secure access is not a new challenge for IT operations, but with the accelerated shift to working from home, the need to rapidly scale secure remote access has skyrocketed. The most promising security approaches in place today, like the Cloud Security Alliance's Software Defined Perimeter (SDP) approach, had their start from government approaches. In SDP environments, government data is being accessed more by unmanaged, risky, and potentially...
Add Favorite
Maintain The Integrity Of Election Systems
In 2019, $425 million were given states due to an ongoing threat to the security of our elections. The Federal Election Commission is looking for ways to secure our national election infrastructure and improve the election administration. Palo Alto Networks helps to ensure the security of our elections and the systems that support our voting process. Our automated tools perform baseline network security posture audits of existing users, applic...
Add Favorite
Work Smarter Through Automation
You are invited to join SailPoint and Column Highmetric on Thursday, May 14th for a live webinar to learn how to work smart and stay safe through the automation integration with ServiceNow. SailPoint's integration with ServiceNow allows service requests to be created and fulfilled according to your organization's policies. With rising helpdesk costs, streamlining access fulfillment is the easiest way to increase your ROI, and maintain a secure...
Add Favorite
Google Cloud Webinar Series: Augment Em...
Please join Google Cloud and Carahsoft for a webinar to demonstrate capabilities both within G Suite and Google Cloud Platform to detect, identify, and remediate end-user security events. Learn how public sector entities can respond to successful phishing attacks that impact other assets on the network, and take Google's approach in isolating the attack vector. During this webinar, you will learn about: End-to-end incident management, from end...
Add Favorite
Security Awareness Training Webinar
With the rise of remote working, agencies are more vulnerable than ever before. Since over 90% of attacks originate from emails and countless breaches are caused by human error, it's crucial to engage your end-users and create a culture of security awareness. Proofpoint's people-centric approach to security will transform your end-users from risky to ready, creating a formidable last line of defense against phishing and ransomware attacks. We'...
Add Favorite
Protecting Your Network Infrastructure...
Webinar Series: Protecting Your Network Infrastructure with Automation, Visibility and Continuous Insight Infoblox, in collaboration with Empowered Networks, presents a three-part webinar series covering Infoblox's NetMRI capabilities, compliance, and configuration automation tasks. Register now for one or more of these upcoming sessions! Webinar 1: Thursday, April 9, 2020 | 11:00am ET; 8:00am PT NetMRI Basics: What is Infoblox NetMRI and How...
Add Favorite
Back to Search Begin New Search