Back to Search Begin New Search Save Search Auto-Notify
Hands-on Lab Series Part 2: Introductio...
View this on-demand session on conducting end-to-end analysis. To start off, we unpacked how Federal, State, and Local agencies are utilizing data-driven approaches to enhance their operations, including reconciliation, risk assessment, and data deduplication. During this on-demand webinar, you'll go hands-on and learn how to apply these techniques for yourself. You will learn how to bring in and merge different sources of data, ensure data qu...
Add Favorite
Malice, Misuse, & Mistakes: How Organiz...
View this on-demand webinar with Privileged Access Management (PAM) experts from Saviynt as they share best practices and anecdotes from their 20 years of experience in the PAM space. They also demonstrate how Saviynt’s Cloud PAM solution can help mitigate the risks of mistakes, misuse, and malice with just-in-time, seamless, identity-driven privileged access management. During this on-demand webinar, you'll have the opportunity to find...
Add Favorite
BeyondTrust FSI Roundtable Webinar
The Office of Management and Budget issued its guidance in January on meeting the requirements for agency networks to implement a Zero Trust architecture strategy. The mandate seeks to defend against sophisticated penetrations by adversaries, emphasizing identity management and access controls are key components of the strategies. Taken together, identity and access controls mean that privileged access management (PAM) is essential. Federal ag...
Add Favorite
The Fundamentals of Application Securit...
As the nine time Gartner Magic Quadrant Leader, the Veracode team touched on the best practices that have assisted many of their existing customers during this four-part webinar series. Upon completion of all four parts you will be awarded a VeraTrack Education Certificate. In order to receive the certificate, you may either attend the live sessions, or view the on-demand recordings. Sessions included: Introduction to Application Security View...
Add Favorite
Introduction to Analytics with Alteryx
View our on-demand session on conducting end-to-end analysis. To start off, we unpack how Federal, State, and Local agencies are utilizing data-driven approaches to enhance their operations, including reconciliation, risk assessment, and data deduplication. View this on-demand webinar on how to apply these techniques for yourself. You will learn how to bring in and merge different sources of data, ensure data quality by conducting exploratory...
Add Favorite
Speed Changes Everything
Are you looking for a quick and secure method for your innovations? Tricentis and SAP invitied you to learn how speed can change everything! You learned how to deliver the fastest, safest, and lowest-cost methods for SAP release. In this On-Demand webinar, you observed: How SAP customers are putting their initiatives into overdrive by cutting the time, risk, and cost associated with deploying SAP projects. How SAP’s official testing solu...
Add Favorite
Fireside Chat: Federal Cybersecurity Di...
Orca Security and Carahsoft invited individuals and their teams to join them for a virtual, interactive fireside chat with Coalfire to discuss alignment to Federal cybersecurity directives which impact every public sector organization. This webinar was joined by Doug Hudson, VP of Public Sector at Orca Security, and Nate Demuth, VP of Cloud Services at Coalfire, during a moderated session with Neil Carpenter, Principal Technical Evangelist at...
Add Favorite
Seamlessly Adopt the Cloud with VMC on AWS
During this webcast attendees learned about how VMware Cloud on AWS solves migration and modernization challenges by delivering a hybrid cloud service that integrates VMware’s flagship software-defined data center along with VMware vCenter management as well as robust disaster protection, and optimizes it to run on dedicated, elastic, Amazon EC2 bare-metal infrastructure.
Add Favorite
Risk, Issue, and Opportunity Management...
How can ServiceNow help end-users comply with the DoD’s Released Management Guide, “DoD Department of Defense Risk, Issue, and Opportunity Management Guide for Defense Acquisition Programs”? During this session, we discussed how customers can both mitigate risk in portfolio management, as well as adhere to the requirements of the Management Guide - all in real-time (as opposed to accessing risk during a project postmortem ass...
Add Favorite
Why Traditional EDR is Still Not Enough...
Attendees of this webinar heard how VMware Carbon Black XDR is the new baseline for serving up the security for organizations today for operational excellence and reducing cost liabilities. With XDR, organizations have been able to experience a number of proven benefits when measured against traditional endpoint security methods, including: Unique capabilities for identifying, prioritizing, and reducing risk Complete coverage: endpoints, work...
Add Favorite
Back to Search Begin New Search