Back to Search Begin New Search Save Search Auto-Notify
Report Card on Risk: Managing Risk in H...
A new generation of faculty and students, technological pressures, rising costs, and emerging risks present a unique set of obstacles for higher education institutions. Watch our on-demand webinar to hear industry experts discuss the risks facing higher education executives today, how an integrated approach to risk management and technology can help manage those risks, and the advantages of leveraging one platform to power innovation and conne...
Add Favorite
Supporting CISA BOD 23-02 with Attack S...
Check out our on-demand webinar with Censys where attendees learned: How to identify CISA BOD 23-02 Understand the risks of remotely accessible management interfaces How Censys found publicly exposed devices
Add Favorite
An Introduction to Advanced Analytics
Watch this Alteryx hands-on-lab for an interactive session on conducting end-to-end analysis. Two Alteryx Sales Engineers, unpacked how federal, state, and local agencies are utilizing data driven approaches to enhance their operations, including reconciliation, risk assessment, and data deduplication. After a brief introduction to the possibilities, attendees get hands-on and learn how to apply the techniques for themselves. Attendees learned...
Add Favorite
AI Driven OSINT for Threat and Risk
In today’s complex threat landscape, organizations are constantly challenged to stay one step ahead of potential risks and threats. This webinar explores the transformative potential of AI-driven Open Source Intelligence (OSINT) in empowering organizations to proactively identify, analyze, and mitigate risks. Watch this on-demand webinar to gain valuable insights into how harnessing the power of OSINT data sources and leveraging machine...
Add Favorite
Scalable Compliance for Small Businesses
What does it mean to be compliant in the world for federal contracting? It means you can follow the government's guidelines and regulations in order to do business with them. It can also entail having the right security clearance and measures in place to secure sensitive data. If your team is unsure if you have the right levels of compliance, this webinar is for you! Join us and our good partner, REXOTA Solutions LLC for this important discussion!
Add Favorite
Safeguarding Your Identity: The Power o...
CrowdStrike’s Identity Threat Protection is a comprehensive solution designed to defend against identity-based attacks and protect agencies and organizations from the ever-increasing risks of identity theft & fraud. Attendees discovered how CrowdStrike, a global leader in cloud-delivered endpoint and workload protection, has extended its expertise to address the critical need for identity protection in today’s digital landscape...
Add Favorite
Federal Policy for Supply Chains What's...
Executive branch policies and Congressional legislation indicate a growing priority for "whole of nation" supply chain resilience. Continuous supply chain monitoring & risk analysis is not just mandated, it's proving to be a critical & necessary strategic deterrent. Federal supply chain policy (Section 8...81) was established to minimize risk in information and communications. Congress is now proposing draft legislation to expand poli...
Add Favorite
Automate Evidence Collection: Manage Cy...
Is your GRC strategy enabling information security activities within your organization? Today's audit and compliance practices require time and resource-intensive information-gathering techniques that produce static and “point in time” results. Organizations can streamline information and evidence gathering by leveraging existing system data, creating objective evidence, maintaining compliance, and reducing risk. Join us for an inf...
Add Favorite
Catch A Hacker
Armis, Gigamon and Carahsoft completed a hands-on experience in the Armis platform, which will help you understand the ease of use, simplicity, and business value for your organization when responding to critical cyber incidents. The session dove into the intersection of Operational Technology (OT), Internet of Things (IoT0, and Internet of Medical Things (IoMT). In the face of such critical challenges, the Armis platform aligned with Gigamon'...
Add Favorite
The Fundamentals of Application Securit...
As the nine time Gartner Magic Quadrant Leader, the Veracode team will touch on the best practices that have assisted many of their existing customers during this four-part webinar series. Upon completion of all four parts, you will be awarded a VeraTrack Education Certificate. In order to receive the certificate, you may either attend the live sessions, or view the on-demand recordings. View the full agenda and register for all four sessions...
Add Favorite
Back to Search Begin New Search