Evolution of SIEM in the Cloud
In recent times, the landscape of Security Information and Event Management (SIEM) solutions has experienced a remarkable metamorphosis. No longer confined to being mere data repositories, SIEM platforms have evolved into dynamic hubs brimming with invaluable insights. Join us in this webcast as we embark on a journey through the contemporary realm of SIEM, spotlighting its departure from traditional methodologies, shifting to the cloud, and i...
The Achilles Systems Hack Assessment Se...
Achilles Systems, a fictitious IT service provider to human resources teams in medium and large businesses, has fallen victim to an attack in which sensitive customer data and, potentially, customer networks, have been compromised. Achilles has a small security team who has historically focused on basic controls and compliance. However, it seems clear this attack was the work of a sophisticated adversary capable of circumventing the controls i...
The Data Strategy That Will Transform Y...
In the public sector, a strategic plan is a critical tool that aims to help move communities forward—but strategic action often falls flat. Aligning financial resources with an organization's strategic goals is crucial for turning the strategic plan into impactful results. Join Government Technology and Euna Solutions for a live webinar where a panel of experts will explore why actioning strategic goals is so challenging for many organiz...
The Evolving Role of AI in Government C...
State and local government organizations continue to be prime targets for sophisticated cyberattacks. While artificial intelligence (AI) presents new risks and threats, it also provides government leaders with powerful tools to enhance their cybersecurity defenses. Join our webinar featuring experts with decades of experience in cybersecurity at the federal level to learn more about: The Evolving Threat Landscape Targeting Governments: Underst...
Give Your Team a Winning Edge with AI a...
Agencies typically process millions of pages of paper every year, from applications to renewals and reporting forms. These documents often need to be indexed and updated when new information becomes available. Administrative tasks like these can create huge bottlenecks, slowing down operations and interfering with agency efficiency. One proven method for expediting this process is automation, but a new generation of automation powered by AI is...
Transforming Mission-Critical Processes...
Agencies typically process millions of pages of paper every year, from applications to renewals and reporting forms. These documents often need to be indexed and updated when new information becomes available. Administrative tasks like these can create huge bottlenecks, slowing down operations and interfering with agency efficiency. One proven method for expediting this process is automation, but a new generation of automation powered by AI is...
Wings of Innovation: Transitioning to C...
Embark on a journey through the skies of Kubernetes as we navigate the fundamentals, deployment strategies, and security for a seamless transition from traditional cloud instances to containerized infrastructure. In the rapidly evolving realm of cloud technology, Aviata finds itself at a pivotal moment, ready to embark on a journey of transformation. With the pressing need to modernize their architecture looming large, the company sets its sig...
Modernizing Financial Systems in State...
Financial systems are undergoing a profound transformation in today's rapidly evolving digital landscape. From combating fraud to harnessing the power of artificial intelligence, organizations worldwide are embracing innovative approaches to modernize their financial ecosystems. Join Government Technology and IBM for an insightful webinar with industry experts and government leaders at the forefront of financial system modernization. You'll he...
Industrial Control Systems Summit Solut...
Adversaries targeting critical infrastructure systems (power grids, water management systems, heavy manufacturing, oil and gas refineries and pipelines, etc.) have demonstrated detail technical knowledge of control system components, industrial protocols, and engineering operations. These skilled and brazen adversaries continue to launch a combination or Ransomware and targeted ICS tailored attacks against the safety and reliability of critica...
2024 State of Security Automation Survey
Automation plays a vital role in improving capacity, efficiency, and performance in the SOC. Security teams spend far too much time “in the weeds,” unable to focus on solving the problems that matter. Security orchestration, automation, and response (SOAR) tools have the potential to streamline analysis, reduce response times, and improve quality. However, SOC teams often struggle to realize the full potential of this kind of autom...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.