Back to Search Begin New Search Save Search Auto-Notify
IT Service Delivery for Distributed Wor...
Join Splunk, Forescout, and Alchemy Global to see how our solution will secure IT service delivery for distributed workforce enablement. With an unprecedented growth in remote connections, our workforce faces a new host of logistical constraints and a larger attack surface than ever before.Before we build an effective remote workforce program, we must ask these questions:How many endpoints are connected at any given time?Are those endpoints co...
Add Favorite
Zero Trust Security for the Digital Workspace
Security is an ongoing challenge for organizations and with today’s dynamic workforce, the challenge is ever-increasing. Rapidly changing work styles and increased use of SaaS applications have resulted in the End-User Computing Zero Trust model becoming one of the most important forms of alternative security, an architectural mindset aimed at securing and protecting your data. VMware Workspace ONE combines Zero Trust conditional access...
Add Favorite
Taking the Kinks Out of the Supply Chain

CANCELED

Supply chain management is critically important to running and maintaining an agency's IT systems, however it has not historically drawn much attention from the C-suite. Currently, many federal agencies use a manual process managed on spreadsheets which can lead to increased cost and risk.New directives have mandated that the Department of Defense must begin monitoring the supply chain within the Department's Risk Management Framework. These c...
Add Favorite
Seeing the Cybersecurity Battlefield: A...
Cybersecurity is a complex problem, constantly evolving and shifting with teams unable to understand where threats are emerging. While the tools being used are valuable and have costly limitations, operators need a full picture of the cybersecurity battlefield. Are you making the most out of your security investments? How can we enrich the picture for each team to ensure that they have the best possible information and insight into the securit...
Add Favorite
QSMO and CDM Webinar
The Evolution of How Cybersecurity is Delivered as a Shared Service Join Palo Alto Networks for a virtual fireside chat with Matt Brown, CEO of Shorepoint, and Rob Palmer, EVP and CTO of Shorepoint, to discuss what impact the first Quality Services Management Office (QSMO) Shared Service offering from The Office of Management and Budget (OMB) & Cybersecurity and Infrastructure Security Agency (CISA) will have on Federal agencies. Hear how...
Add Favorite
Navigating the BootHole Mitigation Process
Eclypsium researchers recently disclosed an arbitrary code execution vulnerability in the GRUB2 bootloader that can bypass Unified Extensible Firmware Interface (UEFI) and OS Secure Boot, impacting other OS defenses. In this webinar, John Loucaides, VP of Research & Development at Eclypsium, will help government agencies understand how to navigate the complex process of mitigating the GRUB2 BootHole vulnerability - without inadvertently ma...
Add Favorite
Bottom Up and Top Down: A Layered Appro...
Office 365 makes it easier than ever for your users to collaborate and meet your mission, but creating granular settings to police access to Teams and the sensitive data stored within them can be challenging for IT teams. This is especially true for government agencies with centralized Office 365 deployments where IT must effectively enforce Teams membership and configurations without impacting non-sensitive collaboration. Locking down your wo...
Add Favorite
Rethink Your Approach to Cybersecurity
Federal departments and agencies employ millions of personnel to carry out the missions and functions that the American public relies on for its well-being. The IT systems and networks of the Federal government continue to be attractive targets for foreign intelligence services and other malicious actors. As the threat landscape changes and attacks become more human-targeted, it's crucial to understand the data your users have access to and ho...
Add Favorite
Take NASA's Security to the Next Level...
During these times, agency frontline workers, help desk, and support teams have gone remote. So, what has Splunk done to address what agencies can do to better facilitate personnel productivity for these teams who are charged with ensuring mission continuity, application security, and availability? Join us for a series of on-demand webinars that are designed to introduce you to the Splunk ecosystem and provide you with a deeper dive into how i...
Add Favorite
Go with the Flow - Building Sustainable...
Security teams are working hard identifying, analyzing, and mitigating threats facing their organizations. Splunk Phantom allows you to harness the full power of your existing security investment with security orchestration, automation, and response. With Splunk Phantom, you can execute actions in seconds, not hours. View our on-demand presentation and demo with Splunk and SGT on the power of Splunk Phantom's workflow engine. During the presen...
Add Favorite
Back to Search Begin New Search