Back to Search Begin New Search Save Search Auto-Notify
Unlock the Power of Splunk ES and RBA i...
During this webinar, we demonstrated how you can overcome common challenges that customers struggle with when operationalizing Splunk Enterprise Security and Risk Based Alerting. Whether you are a new ES customer, or you’ve had ES for years, this webinar showed you how to quickly unlock the powerful features contained in Splunk ES. We presented a demo of Outpost Security's Splunk App - Zero-to-One. This is a premium Splunk App available...
Add Favorite
Cyber-Informed Engineering for OT Secur...
Attendees joined us for a webinar focused around IT/OT integration for AVEVA PI users. Cyber-Informed Engineering (CIE) is emerging as the most useful change in perspective in Operational Technology (OT) security in a decade. CIE represents a shift in OT security, offering a dual-sided approach. On one side, it educates engineers about cyber threats and mitigation strategies. On the other, it leverages powerful safety, protection and network e...
Add Favorite
Splunk Workshop Series
Participants joined us for a workshop series designed to enhance Splunk skill sets across their organization! Our five-part virtual workshop series covered fundamental basics, machine learning, observability, dashboard studio, and investigating fraud. Led by industry experts, these hands-on workshops empowered teams to unlock the full potential of Splunk!
Add Favorite
How AI Will Transform Higher Education...
In this webinar, attendees learned about how the AI-driven smart campuses of the future will look. We examined how universities are leveraging AI to transform operations and the student experience. Viewers also gained insights about how forward-thinking institutions are accelerating digital transformation to better prepare for the future of higher education supported by AI.
Add Favorite
New Zero Trust Endpoint Technology for...
Attendees gained an understanding of the differences between traditional zero clients, thin clients, and the new Trusted Zero Clients and will learn about opportunities to easily begin this exciting new technology in their environments as a way to begin preparing for the coming Zero Trust mandate.
Add Favorite
Microsoft Office Offensive Tradecraft
View this webinar to learn more about: Recent developments such as Mark-of-the-Web Microsoft security controls including trust settings and decision flows Tactics for gaining initial access, lateral movement, and long-term persistence
Add Favorite
Protecting Your Agency's Data in the Di...
Whether you're a seasoned database administrator or new to SAP ASE, SAP IQ, and SAP ASPE, this webinar provided valueable insights applicable to all levels of expertise. In this webinar, attendees: Gained insights into the security features in SAP ASE, SAP IQ, and ASPE Discovered products, proven strategies, and techniques that enhanced attendees security posture Engaged with Wayne Waldrup our seasoned database expert during our Q&A sessio...
Add Favorite
Out of Sight Out of Control: Asset Inte...
Asset visibility and control is an unsolved challenge, with a huge amount of the attack surface being assets that are un-agentable or traditionally manageable. Allow Armis and Semperis to enlighten you on how organizations have huge blind spots that lead to unknown and unquantifiable cyber risk. During this complimentary webinar, attendees learned about: Examples of unmanaged and IoT devices that can’t be protected by traditional systems...
Add Favorite
Back to Search Begin New Search