97 webcasts found
+ 3 past events found
Back to Search Begin New Search Save Search Auto-Notify
Operationalizing Zero Trust with Deep O...
Network blind spots prevent Zero Trust deployment from being successful due to the lack of visibility into network telemetry. As the network grows and evolves, this pain will worsen if not addressed at the foundational level. Gigamon Deep Observability ensures your tools and Zero Trust policy engine have access to all network-based communications in your organization. For any effective Zero Trust implementation, full network visibility and eli...
Add Favorite
TechNet Cyber Webinar Series: Demystify...
In this on-demand webinar, attendees learned: How to avoid pitfalls in your ZTA implementation Technical and non-technical ZTA aspects Key aspects of the ZTA data pillar
Add Favorite
Zero Trust and the Future of Compliance...
Participants joined us and our panelists from Qmulos, Deloitte, and Cisco in a thought-provoking webinar that delves into the heart of Zero Trust and its transformative impact on security and compliance. We will chart the path to compliance modernization, demonstrating how Zero Trust forms the bedrock of an advanced, data-driven security architecture. This session empowered IT professionals, compliance officers, and corporate leaders to align...
Add Favorite
Zero Trust & SecOps Automation: The Fut...
Department of Defense (DoD) agencies are taking concrete steps to transition to a zero-trust architecture to protect critical data and systems. Transitioning to a zero-trust architecture requires a fundamental reimagining of security operations centers (SOCs) and teams. SOCs have traditionally been structured around the role of the security operator, rather than the data and lacked both automation and DevOps practices. To establish a true zero...
Add Favorite
Mastering the DoD Zero Trust Journey: B...
In a rapidly changing digital landscape, federal agencies face a constant battle against cyber threats. With the stakes higher than ever, you need a strategic advantage to safeguard your agency's sensitive assets and ensure the resilience of the Department of Defense network environment. Embracing the DoD Zero Trust Strategy is the key to unlocking this potential and positioning yourself as a hero in this evolving story. View the engaging webi...
Add Favorite
How to Resist Ransomware
Hear from federal cyber leaders at DOD and CyberArk on the best tips, tricks and strategies for resisting ransomware and protecting federal data. Ransomware attacks against federal IT systems surged to unprecedented levels at the beginning of the COVID-19 pandemic and show no sign of abating, with ransomware losses surpassing $1 billion in the second half of 2021. Federal agencies handling mission-sensitive medical, financial, demographic and...
Add Favorite
Tech on Tap: F5 Future Proofing Your Ap...
APIs are the lifeblood of the internet today. Everything from booking flights to reading your daily newsfeeds is all made possible by the growth of data sharing using Application Programming Interfaces (APIs). With the growth of modern applications, developers often unintentionally leak sensitive datasets. The proliferation of APIs has marked them as a prime target for malicious actors and nation-states leaving the DoD and the War Fighter vuln...
Add Favorite
How U.S. Federal Agencies Can Apply TIC...
In this webinar speakers reviewed how US Federal agencies can apply Trusted Internet Connection (TIC) 3.0 to AWS workloads, as well as the AWS Year-End Savings (YES) Promotion for select AWS Services, available from June 8, 2023 to September 30, 2023. AWS subject matter experts discussed: What is the TIC initiative TIC 2.0 vs. TIC 3.0 differences TIC 3.0 controls How TIC 3.0 aligns with Zero Trust Applying TIC 3.0 framework to AWS workloads by...
Add Favorite
The New National Cybersecurity Strategy...
Attendees of this webinar joined OPSWAT for a discussion around the new National Cybersecurity Strategy, that builds upon previous efforts, such as Zero Trust, to bolster protections to secure America’s cyberspace and its digital ecosystem. The reliance on critical infrastructure makes those who manage it big targets for nation-state and ransomware attacks, as well as any members of the Defense Industrial Base that are managing the criti...
Add Favorite
Forcepoint Zero Trust Content Disarm ...
At this on-demand webinar, we discussed the following capabilities of Forcepoint in-depth: Defeating All Malware for emails coming into your environment by cleaning every file Integrating Directly with Microsoft 365 to remove malware prior to emails being sent from or delivered to the mailbox without costly tools that need to be updated like AV or Sandboxing Stopping Data Exfiltration with Forcepoint's anti-steganography capabilities built int...
Add Favorite
Back to Search Begin New Search