Overcoming Zero Trust Challenges in Fed...
As federal agencies advance toward implementing Zero Trust Architecture (ZTA), the path is often met with challenges ranging from managing access controls to ensuring continuous monitoring and policy enforcement. Attendees joined us to learn how ServiceNow offers a powerful, integrated platform designed to meet these needs, supporting agencies in achieving ZTA compliance and enhancing security resilience.Registrants learned how ServiceNow Secu...
How EDD's Cybersecurity Division Evolve...
Is your public sector organization struggling to combat cyber attacks? Attendees joined Elastic and California EDD to learn how Elastic provided the EDD with real-time visibility into their systems, enabling them to detect and prevent cybersecurity risks early on. During this session, Elastic & California EDD experts discussed:California's enhanced ability to identify suspicious patterns and anomalies in their dataCalifornia's improved inv...
Next-Gen Judicial Efficiency: Investiga...
Attendees joined us on Tuesday, December 3rd for an insightful webinar that explored the integration of Salesforce and Docusign for the judicial and law enforcement industry. This session demonstrated how Salesforce's powerful CRM capabilites seamlessly integrate with Docusign Intelligent Agreement Management solutions to streamline judicial procceses and improve efficiency.
Enhancing GIS Operations for Airports
As airports navigate complex operations, GIS technology becomes essential for integrating data from multiple systems, providing a comprehensive view of operations. This recording showcases insights from industry experts and explore the critical role of GIS in airport operations followed by a collaborative discussion. Watch this on-demand recording to view this virtual roundtable focused on GIS operations in the aviation sector. This recording...
Strengthening Cybersecurity in the Judiciary
As the digital transformation of the judiciary accelerates, courts are increasingly reliant on technology to administer justice efficiently and securely. However, this reliance brings heightened cybersecurity risks, necessitating robust defense mechanisms to protect sensitive data and maintain the integrity of judicial processes. Listen to experts from Zscaler and CrowdStrike in this comprehensive on-demand recording designed specifically for...
CompTIA CySA+ Certification (CS0-003) C...
Information security analyst is one of the fastest-growing job categories in the U.S., with 35 percent overall growth expected by 2031. CompTIA’s Cybersecurity Analyst+ (CySA+) is one of the most popular certifications related to the role — and it’s getting an update in 2023 to align with the most in-demand knowledge and skills requested by employers. Join the Infosec Team live while Patrick Lane, Director of Certification Pr...
2024: Big Tech In FED Gov - Adobe (13 of 15)
This Webinar Series will profile the BIG TECH companies and their intersection with the US Federal Government. We will look at the big tech contracts within the Defense Department, Civilian Departments and Independent Agencies as well as stock price, current news, federal contracting trends, lobbying information if available, and more. Don't miss this lively data filled webinar series courtesy of federal data and analysis from GOVSPEND.com Web...
Eliminate Network Blind Spots and Build...
The Forescout and Gigamon integration offers a flexible solution that centralizes network intelligence from multiple sources, empowering your Network and Security Operations Center. This minimizes blind spots, strengthens security hygiene and helps you better manage cyber risks. Attendees joined Ron and Nikhil for our discussion to learn how Forescout & Gigamon can: Identify All Devices: Learn how Forescout automatically identifies and tra...
Exploited Vulnerabilities, the Threat A...
In this webinar, Patrick Garrity, Security Researcher at VulnCheck, dove into exploited vulnerabilities and explored which technologies are impacted, which threat actors are most active, and how quickly vulnerabilities are being exploited once disclosed. Understanding these dynamics is key to staying ahead of emerging threats and protecting your mission. Attendees joined VulnCheck on December 4th to discover:The most commonly exploited vulnera...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.