Back to Search Begin New Search Save Search Auto-Notify
Hyperconverged Infrastructure for the M...
Datacenter requirements are evolving and the Navy needs a durable platform that delivers the full power of Hyperconverged Infrastructure (HCI) for workloads in environmentally-challenging locations and/or space-constrained areas. Whether you are deploying a data center at a forward operating base, on a ship/submarine, running real-time GPS mapping on the go, or implementing video surveillance in remote areas, this session will teach you how De...
Add Favorite
Preparing Your Agency for IIJA: How to...
Many DOTs and MPOs have been hit hard by the pandemic. The compounding impact of a reduction in funding and labor shortages resulting from "The Great Resignation", demand agencies rapidly transform to gain the efficiencies necessary to maintain and improve roads and transit systems. Fortunately, The Federal Infrastructure Investment and Jobs Act (IIJA) brings hope for many state and local departments and agencies for the funding required to su...
Add Favorite
Build a More Secure Future with Google...
During this webinar, we will cover: Google Workspace as a solution for continuity of operations and disaster recovery Overview of Google security offerings: Security Command Center, Chronicle, VirusTotal, reCAPTCHA, BeyondCorp, and Work Safer program
Add Favorite
Network Automation with F5 NGINX ...
Red Hat's Ansible Automation platform is the leading enterprise-ready automation platform helping network operators save time and reduce risk. Traditional approaches to network configuration can slow applications and make them prone to errors. Simple, powerful, agentless, and proven, Ansible Automation Platform brings network automation to the enterprise, adding the features and functionality needed for team-based automation at scale. Join us...
Add Favorite
Attack Surface Management from Palo Alt...
The attack surface of universities and school districts ballooned in recent years with the explosion of remote learning. It's never been more critical to have an up to date inventory of all assets - including IP addresses, domains, certificates, cloud infrastructure and physical systems - connected to your organization. You can't predict with certainty how you will be attacked in the future, but you can learn from recent attacks - and from the...
Add Favorite
Unlock Your Organization's Data 'Black...
Tableau is a leading data analytics and visualization technology that is across the entire Aerospace, Defense, and Missile Industries. Tableau has been used to help organizations gain quick and impactful insights from complicated data infrastructures allowing any business user to take advantage of. View this on-demand webinar to understand how you could leverage Tableau to enhance your decision making in support of your most important initiati...
Add Favorite
Zero Trust & SecOps Automation: The Fut...
Department of Defense (DoD) agencies are taking concrete steps to transition to a zero-trust architecture to protect critical data and systems. Transitioning to a zero-trust architecture requires a fundamental reimagining of security operations centers (SOCs) and teams. SOCs have traditionally been structured around the role of the security operator, rather than the data and lacked both automation and DevOps practices. To establish a true zero...
Add Favorite
Mayhem to Magic: How to Meet the Mandat...
In the last three years, the number of released cybersecurity mandates has doubled. From EO 14028, to BOD 23-01, 02, and (likely soon) 03, not to mention M-21-31 and M-22-09, these mandates are rarely backed with funding or staffing to help meet the reporting requirements. Rarely do agencies have the tools to report outcomes easily and in a trustworthy way. The result? Many agency CISOs and CIOs are left to fulfill an onslaught of mandates wi...
Add Favorite
Successfully Navigate the Convergence o...
In this webinar, attendees will learn: How to overcome internal control siloes and the increasing Importance of Cross-Application GRC Overcoming challenges posed by elevated or privileged access requirements Why Continuous Controls Monitoring should be at the heart of your GRC strategy Best practices for evaluation solutions
Add Favorite
MOSAICS and the Future of Industrial Cy...
As the vulnerability of industrial control systems (ICS) to cyberattacks continues to have a clear impact on infrastructure security, emerging security solutions are essential to the future of industrial cybersecurity. MOSAICS – More Operational Situational Awareness for Industrial Control Systems – is the working prototype demonstrating an integrated capability for ICS operational defense. This roundtable discussion pulls together...
Add Favorite
Back to Search Begin New Search