323 events found
Back to Search Begin New Search Save Search Auto-Notify
Breaking Intrusion Kill Chains with AWS
Many cyber-attacks employ a repeatable process called the ‘intrusion kill chain’ to identify targets, weaknesses, potential exploits, and use them to victimize organizations. It’s how an attacker ultimately gains access to protected data to steal it, encrypt it, and/or destroy it. Pioneered by Lockheed Martin, anti-kill chain strategies are helping Chief Information Security Officers (CISOs) and cybersecurity practitioners ac...
Add Favorite
Google Cloud 2020 Webinar Series: Secur...
Google Cloud and Carahsoft invite you to a webinar to learn more about cybersecurity solutions and demonstrate specific use cases. Government agencies continue to modernize by expanding their services and migrating workloads to hybrid and cloud environments. These actions create rapid growth in the volume of log data generated by devices and systems. Security professionals rely on these logs for audit information, forensic evidence, and to det...
Add Favorite
Go with the Flow - Building Sustainable...
Security teams are working hard identifying, analyzing, and mitigating threats facing their organizations. Splunk Phantom allows you to harness the full power of your existing security investment with security orchestration, automation, and response. With Splunk Phantom, you can execute actions in seconds, not hours. Join Splunk and FCN for an on demand presentation and demo on the broad strokes of Splunk Phantom's automation engine. During th...
Add Favorite
Breaking the Chains of Siloed Data with Boomi
On the journey to digital transformation, agencies generate and manage massive amounts of data. Efficiently leveraging that data is critical to drive the right strategic and operational decision, but connecting and making sense of data cross your agency in a hybrid-cloud or multi-cloud environments is not easy. View our on-demand webinar to discover how Boomi can: Digitize services Improve operational efficiencies Meet your organization and cu...
Add Favorite
Provide Zero Trust Architecture in a Hy...
State and local governments are highly vulnerable to cyber-attacks. With an increase in telework environments, agencies have been forced to rethink their cybersecurity approach. Determining the right security solution can become quite complex for state governments with the amount of vendors on the market - along with the lack of staff and limited funding. Fortunately, an intrinsic security approach simplifies your security strategy by building...
Add Favorite
Security on the Seas Webinar Series: IT...
View this on-demand webinar to learn how network visibility and verification are key to ensuring your zero-trust network architecture. Learn how a behaviorally accurate mathematical model, or Digital Twin, enables you to PROVE your network security posture. And determined blast radius of a compromised host, do full endpoint analysis, check your OS vulnerability… Zero-trust, but verify.
Add Favorite
Adobe eLearning World 2020
For the first time ever, Adobe is taking its annual eLearning Conference online! View Adobe on-demand for 38 sessions of learning, collaborating, and sharing among all levels of learning and development (L&D) professionals. The virtual conference on-demand contains pre-conference workshops along with a 'What's New' keynote session led by Adobe, followed two consecutive days of informative sessions presented by leaders in the eLearning indu...
Add Favorite
Beyond IT Security, Cyber-Physical Conv...
Well past cyber "wake-up calls", recent security events prove that there is nothing more important for organizations than to be prepared for the unexpected. In this era of digital transformation, the line between cyber and physical worlds has faded. Today's blended threats attack deep within connected industrial control systems and networks, yet most organizations still manage and operate their security in silos. In this on-demand session, lea...
Add Favorite
Security, Visibility and Management for...
Government agencies are utilizing Micro-Service Architecture (MSA), the predominant design pattern for application development, but these evolved patterns have introduced new challenges and complexities to understand. James Harmison, a senior solutions architect at Red Hat with over a decade of experience in operationalizing applications for enterprise use, addressed: The concerns that teams have as they try to deploy MSA applications into pro...
Add Favorite
Adobe Sign Webinar Series: Embrace Seam...
As organizations across the country continue to operate remotely, digital processes, such as e-signatures, have never been more crucial to an agency's success. E-signatures eliminate the hassle of printing, signing, and scanning documents for streamlined delivery services and reduced delays that come with tracking forms manually. Adobe Sign will have you saving paper and tossing the pen to deliver fast, legal, and secure services through 100%...
Add Favorite
Back to Search Begin New Search