Back to Search Begin New Search Save Search Auto-Notify
The U.S. Securities and Exchange Commis...
The U.S. Securities & Exchange Commission recently proposed rules to strengthen the ability of public companies, funds, and advisors to combat cybersecurity threats and implement risk mitigation processes. SecurityScorecard was joined by Kristy Littman, U.S. Securities and Exchange Commission Chief of the Crypto Assets and Cyber Unit, Michael Daniel, President & CEO of the Cyber Threat Alliance and Friso van der Oord, Senior Vice Presi...
Add Favorite
Hands-on Lab Series Part 2: Introductio...
View this on-demand session on conducting end-to-end analysis. To start off, we unpacked how Federal, State, and Local agencies are utilizing data-driven approaches to enhance their operations, including reconciliation, risk assessment, and data deduplication. During this on-demand webinar, you'll go hands-on and learn how to apply these techniques for yourself. You will learn how to bring in and merge different sources of data, ensure data qu...
Add Favorite
Malice, Misuse, & Mistakes: How Organiz...
View this on-demand webinar with Privileged Access Management (PAM) experts from Saviynt as they share best practices and anecdotes from their 20 years of experience in the PAM space. They also demonstrate how Saviynt’s Cloud PAM solution can help mitigate the risks of mistakes, misuse, and malice with just-in-time, seamless, identity-driven privileged access management. During this on-demand webinar, you'll have the opportunity to find...
Add Favorite
BeyondTrust FSI Roundtable Webinar
The Office of Management and Budget issued its guidance in January on meeting the requirements for agency networks to implement a Zero Trust architecture strategy. The mandate seeks to defend against sophisticated penetrations by adversaries, emphasizing identity management and access controls are key components of the strategies. Taken together, identity and access controls mean that privileged access management (PAM) is essential. Federal ag...
Add Favorite
2022 Red Hat Security Symposium On Demand
Join our on-demand Security Symposium webinar series, where IT security professionals can learn from Red Hat® and Intel security experts, partners, and peers to solve security issues together as a community. This Security Symposium is an on-demand, six-session webinar series with presentations from experts discussing hybrid cloud security challenges that organizations face and solutions to tackle these challenges. During this series, we...
Add Favorite
The Fundamentals of Application Securit...
As the nine time Gartner Magic Quadrant Leader, the Veracode team touched on the best practices that have assisted many of their existing customers during this four-part webinar series. Upon completion of all four parts you will be awarded a VeraTrack Education Certificate. In order to receive the certificate, you may either attend the live sessions, or view the on-demand recordings. Sessions included: Introduction to Application Security View...
Add Favorite
Introduction to Analytics with Alteryx
View our on-demand session on conducting end-to-end analysis. To start off, we unpack how Federal, State, and Local agencies are utilizing data-driven approaches to enhance their operations, including reconciliation, risk assessment, and data deduplication. View this on-demand webinar on how to apply these techniques for yourself. You will learn how to bring in and merge different sources of data, ensure data quality by conducting exploratory...
Add Favorite
Speed Changes Everything
Are you looking for a quick and secure method for your innovations? Tricentis and SAP invitied you to learn how speed can change everything! You learned how to deliver the fastest, safest, and lowest-cost methods for SAP release. In this On-Demand webinar, you observed: How SAP customers are putting their initiatives into overdrive by cutting the time, risk, and cost associated with deploying SAP projects. How SAP’s official testing solu...
Add Favorite
Fireside Chat: Federal Cybersecurity Di...
Orca Security and Carahsoft invited individuals and their teams to join them for a virtual, interactive fireside chat with Coalfire to discuss alignment to Federal cybersecurity directives which impact every public sector organization. This webinar was joined by Doug Hudson, VP of Public Sector at Orca Security, and Nate Demuth, VP of Cloud Services at Coalfire, during a moderated session with Neil Carpenter, Principal Technical Evangelist at...
Add Favorite
Risk and Reels: A Cybersecurity Podcast...
Hackers, curiosity, security, pen-testers, kindness, analogies and Hollywood criminals. Welcome to the first episode of Risk and Reels with Jeffrey Wheatman, featuring Jayson Street (OG Pen Tester and Chief Chaos Officer for Trusec), a self-proclaimed hacker. WHAT IS RISK AND REELS: A CYBERSECURITY PODCAST? A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheat...
Add Favorite
Back to Search Begin New Search