4 webcasts found
+ 10 past events found
Back to Search Begin New Search Save Search Auto-Notify
Securing Your Data: The New Currency of...
Data is now currency for nation states, criminal organizations, and bad actors. They all want your data to sell to the highest bidder and your data could hold personal information, state secrets, or proprietary data. Please join Trustwave Government Solutions and learn more about the securing of crown jewels. During this webinar, you will have the opportunity to learn about: Data Security best practices for securing your databases Toxic Combin...
Add Favorite
Oracle Cloud: Native VMware for Defense...
Oracle Cloud VMware Solution is uniquely built and authorized for defense and intelligence communities to accelerate mission successes by extending VMware-based workloads to the cloud without re-architecting or re-tooling. Oracle Cloud provides more compute shapes to run VMware environments than all other hyperscalers combined, and ranges from providing the smallest compute shapes at the lowest entry point to the largest shapes for the most de...
Add Favorite
Optimizing Threat Detection and Respons...
In recent, The White House issued a National Security Memorandum (NSM-8) specifying how the defense, national security and intelligence community are to bring their national security systems (NSS) into compliance with the Executive Order 14028 on improving cybersecurity across the federal government. Attendees joined Elastic experts for a comprehensive overview of the Elastic platform's robust cybersecurity capabilities, focusing on compliance...
Add Favorite
Future-Proofing Aerospace & Satellite C...
Amid a backdrop of escalating cyber threats within the aerospace & satellite (A&S) industry, and with federal agencies like the U.S. Space Force, NASA, and the Intelligence Community deepening ties within the supply chain, cybersecurity compliance has emerged as a linchpin for success. As the Space Force unveils its largest budget yet at $30 billion for FY24, the urgency for A&S vendors to align with federal cybersecurity standards...
Add Favorite
Back to Search Begin New Search