Back to Search Begin New Search Save Search Auto-Notify
Sea-Air-Space 2024 Webinar Series: Fort...
Thank you for your interest in our Sea-Air-Space 2024 Webinar Series, Ivanti Session: Fortifying DoD Networks with CAASM & Patch Management Attendees of this webinar learned how Ivanti can help your organization: Implement a risk-based approach for vulnerability prioritization and patching in DoD and Federal networks Incorporate vulnerability management processes through automation Enable better collaboration between IT and security stakeh...
Add Favorite
Automated & Continuous Security Complia...
Are you struggling to keep up with ever increasing security compliance and regulatory requirements? Is your team tired of manually intensive and labor some work for keeping up compliance efforts? Unlock the potential of automated and continuous security compliance and risk management to fortify your organization's defenses. Attendees joined us to learn more about: Regulations and industry standards driving cybersecurity efforts in the public s...
Add Favorite
Roadmap to DoDD 8140.03M Compliance: A...
With the release of new DoDD 8140.03M, compliance remains a top concern for agencies. In a dynamic and rapidly changing cyber landscape, it's never been more important to stay ahead of the curve. While it’s no easy task to navigate, early implementation and strategic planning are critical to the nation’s security. WillCo Tech offers trusted cybersecurity expertise management, equipping the DoD workforce with the largest cybersecuri...
Add Favorite
AO Perspectives: Managing Risks and Str...
Picture this: you're on the brink of securing that crucial ATO approval, but the path is fraught with pitfalls—complex regulations, potential human errors, and the constant specter of cyber threats lurking in the shadows. As an Authorized Official (AO), you're all too familiar with the uphill battle of navigating the complexities and risks of the ATO package approval process while maintaining the resilience of your organization's defense...
Add Favorite
The Intent to Compromise: Bypassing Fir...
Today’s technology professional needs a detection system that not only blocks any indicator if their site is compromised, but also one that blocks access to malware downloads, and prevents phishing attacks. What if your system could also identify threats while in the planning stage? This is the zone where lookalike detection comes in, and it can proactively prevent attacks before they are even launched. This webinar taught how threat hun...
Add Favorite
Enhancing Unemployment Insurance Integr...
This webinar covered key aspects of Mastercard's approach to fraud prevention, including: Enhancing the accuracy of identity verification processes. Ensuring seamless access to unemployment benefits for legitimate workers. Utilizing existing data to assess the riskiness of claims more effectively. Streamlining the process to fund legitimate claims quickly. Achieving the ideal balance between security measures and accessibility for users.
Add Favorite
Cost Saving Measures for Federal Agenci...
In this session, we highlighted: Understanding the current cost-saving landscape for federal agencies in 2024. Practical strategies for identifying and eliminating inefficiencies within risk and security teams. Exploring the role of technology in driving cost savings and efficiencies. Real-world case studies and success stories of federal agencies implementing cost-saving measures. Actionable steps to implement cost-saving measures while maint...
Add Favorite
Leveraging Splunk Cloud at NASA
Participants discovered how Splunk empowers organizations to enhance resilience. They joined us to: Learn about our secure and compliant Cloud FedRamp solutions tailored to government agencies Gain insights into the responsibilities and capabilities of administrators within Splunk's Cloud environment Explore the advantages of utilizing Splunk Cloud, including increased security and reliability Understand best practices for migrating to Splunk...
Add Favorite
Unlock the Power of Splunk ES and RBA i...
During this webinar, we demonstrated how you can overcome common challenges that customers struggle with when operationalizing Splunk Enterprise Security and Risk Based Alerting. Whether you are a new ES customer, or you’ve had ES for years, this webinar showed you how to quickly unlock the powerful features contained in Splunk ES. We presented a demo of Outpost Security's Splunk App - Zero-to-One. This is a premium Splunk App available...
Add Favorite
New Zero Trust Endpoint Technology for...
Attendees gained an understanding of the differences between traditional zero clients, thin clients, and the new Trusted Zero Clients and will learn about opportunities to easily begin this exciting new technology in their environments as a way to begin preparing for the coming Zero Trust mandate.
Add Favorite
Back to Search Begin New Search