Cybersecurity Resilience for Public Wat...
Public water and wastewater systems are ideal targets for cybercriminals because they combine three ingredients: tight budgets, lax cybersecurity practices, and almost guaranteed publicity, even for small attacks. While agencies can’t control increasing hacktivism targeting their utilities, you can increase your resilience by implementing basic cyber hygiene practices that make you a less attractive target and limit the damage from a cyb...
How Deep Observability Improves Agency...
As agencies modernize their cybersecurity approach, aligning with Zero Trust (ZT) principles is no longer aspirational—it’s mission critical. But achieving a robust Zero Trust Architecture (ZTA) demands more than policy frameworks and access controls. It requires deep, continuous visibility into the network itself. This webinar explored how deep observability empowers agencies with actionable insights to meet Zero Trust compliance...
2025 FedRAMP Updates
stackArmor teamed up with Carahsoft, the leader in public sector cloud solutions for Federal and Public sector organizations, to provide an exclusive webinar that showcased how commercial ISVs as well as Federal Agencies can take actionable steps to meet new and emerging Federal cybersecurity mandates, including assessing AI systems risk.Topics of this webinar included:Developing and managing digital compliance artifacts using OSCALUsing SBOMs...
Safely Scaling AI in the Public Sector
Public sector agencies are navigating the tension between the transformative promise of AI and the challenges of scaling its use responsibly.During this webinar, Dataiku demonstrates a practical look at how organizations can move beyond experimentation and begin deploying AI solutions that are secure, cost-effective and aligned with mission goals.This session explored:Strategies for Future-Proofing AI Initiatives: How your organization can sta...
Navigating Budgets in the Modern Landscape
We invite you to view our complimentary Demo Desk: Navigating Budgets in the Modern Landscape. Learn more about the ever-evolving dynamics of budgeting in today's financial landscape. During the second demo of our series, we looked into how changes across the board have impacted cybersecurity funding, new administrative changes and how they have reshaped budgets on every level. We also reviewed the new administration's impact and how Fortinet...
Beyond Compliance Checkboxes: Designing...
During this webinar Trevor Young, Chief Product Officer for Security Compass, the makers of industry leading Secure by Design Toolset “SD Elements”, and Jay Ryan, US Federal PM took a deep dive into how to build security directly into your software development lifecycle – not as an afterthought, but as a core principle.In this session, we cut through the noise and delivered actionable insights on:Slaying the Compliance Beast:...
Ask Us Anything: VMware by Broadcom Army ELA
Attendees joined us for our Ask Us Anything: VMware Army ELA webcast where they heard from Department of Defense IT expert and VMware Army Program Director John Jordan on how you can best leverage VMware technology in this contract.During this webcast, attendees learned about:The full scope of VMware technologies available to you in this new ELAA variety of army-specific IT trainings you and your team can attend to upgrade your mission-critica...
Strategies for Navigating the Future of...
This webinar explored the 3 key strategies that public sector organizations must adopt to secure their digital services and ensure positive, authentic citizen experiences in the face of evolving bot threats.In this session, thought leaders covered:Understanding the Threat: Explore how public sector organizations can effectively balance robust bot defense with the need to offer smooth, user-friendly interactions for citizens.Combating Bot Activ...
Streamlining the User Experience for St...
Thank you for joining our discussion on the Arizona Department of Economic Security’s new A to Z Portal. We hope you enjoyed learning how AZ DES, Salesforce, and ID.me collaborated to create a secure, seamless, and citizen-focused digital experience. Stay tuned for the on-demand recording and additional resources to continue your digital transformation journey.
Data Security Made Simple: How Best-of-...
During this session, we discussed how Agentless Data Protection and Key Management Solutions can work together to strengthen your security posture. We explored the pitfalls that lead to breaches and best practices to protect your organization. View the recording to hear our expert speakers, Ed Reynolds, Senior Product Manager at Entrust, Bob Lam, CEO and Co-Founder, ShardSecure, Inc., and Jesper Tohmo, CTO and Co-Founder, ShardSecure, Inc. Ke...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.