Back to Search Begin New Search Save Search Auto-Notify
Defend Smarter: Leveraging AI to Maximi...
Are you struggling to keep up with ever increasing security compliance and regulatory requirements? Is your team tired of manually intensive and labor some work for keeping up compliance efforts? Unlock the potential of automated and continuous security compliance and risk management to fortify your organization's defenses. Attendees joined us to learn more about:Regulations and industry standards driving cybersecurity efforts in the public se...
Add Favorite
Take home the GOLD with Veeam Data Protection
Join us for an interactive LEGO experience with Jeff Reichard, Vice President Solution Strategy at Veeam who showed Veeam's latest integrations allowing you to combine secure data protection with your existing security toolset and Adam Ward, LEGO extraordinaire, who simultaneously guided us through the assembly of an Olympics-themed LEGO model to inspire your data security efforts.
Add Favorite
Fortress in the Cloud: Building Zero Trust
In today's increasingly complex cloud landscape, securing your environment requires a fundamental shift from traditional castle-and- moat defenses to a zero trust approach. This webinar, co-hosted by Palo Alto Networks and AWS, guided attendees through the essential concepts of zero trust security and explored how Palo Alto Networks and AWS can empower the attendees to achieve it.During this webinar, attendees:Understood the core principles of...
Add Favorite
Modernizing for Future-Proof Flexibilit...
In this webinar, attendees got to hear:How Pima, AZ got started the daunting task of modernizing its data infrastructure with Qlik and SnowflakeHow Qlik Data Integration and Snowflake started the journey on-premise and have created the foundation for Pima County’s continued modernization efforts with 10+ systems moved to Snowflake with sub-second replicationThe outcomes Pima County has seen since modernizing in its data movement, integra...
Add Favorite
Using AI to Prevent Data Loss and Email...
A comprehensive approach to stopping sensitive data loss combines a traditional rules-based approach with behavioral AI. Organizations face substantial security risks from misdirected emails and data exfiltration, leading to increased labor costs for investigations, regulatory reporting, and compliance communications. As a key conduit for sensitive data, email can expose businesses to regulatory fines, reputational damage, and customer loss. T...
Add Favorite
AI Under the Sun: An ASU+GSV EDU Webina...
As summer approaches, beat the heat with cutting-edge knowledge of the transformative potential of AI within education in our summer school webinar series. Join Google Cloud experts as they unravel the capabilities of AI and offer fresh waves of insight and innovation.
Add Favorite
2024: FAR Part 42, Contract Administrat...
Join Washington DC based, Jennifer Schaus & Associates in the 2024 Webinar Series covering The FAR, Federal Acquisition Regulations. This series features guest speakers who will uncover the important details and nuances of The FAR. Get educated about the rules and regulations in the game of federal contracting. This series is COMPLIMENTARY & RECORDED. Recordings are posted on our YouTube Channel. CORPORATE SPONSORSHIPS of this Webinar...
Add Favorite
AI Under the Sun: An ASU+GSV EDU Webina...
As summer approaches, beat the heat with cutting-edge knowledge of the transformative potential of AI within education in our summer school webinar series. Join Google Cloud experts as they unravel the capabilities of AI and offer fresh waves of insight and innovation.
Add Favorite
F5 BIG-IP Next - Explore the Next Gener...
Attendees joined F5 and Iron Bow at Rocket City Tavern on Tuesday, June 18th for a hands-on lab featuring BIG-IP Next.All BIG-IP users were invited to this personalized training on BIG-IP Next, F5’s Next Generation Platform. During the session, attendees received a first look at the BIG-IP Next platform while going through application deployment exercises to address load balancing, application security, and app access use cases.During th...
Add Favorite
Multi-Layered Identity Authentication f...
As fraud actors increase their operations in velocity and capabilities, especially with the use of emerging technologies as the weapons of choice, you and your citizens are at risk of becoming a victim. Are you able to rapidly and at scale, confirm who is behind the keyboard? If the answer is no, then this webinar is for you. It will help you in solving your identity authentication challenges, diminishing a fraudster's success. Our esteemed sp...
Add Favorite
Back to Search Begin New Search