Take NASA's Security to the Next Level...
During these times, agency frontline workers, help desk, and support teams have gone remote. So, what has Splunk done to address what agencies can do to better facilitate personnel productivity for these teams who are charged with ensuring mission continuity, application security, and availability? Join us for a series of on-demand webinars that are designed to introduce you to the Splunk ecosystem and provide you with a deeper dive into how i...
Go with the Flow - Building Sustainable...
Security teams are working hard identifying, analyzing, and mitigating threats facing their organizations. Splunk Phantom allows you to harness the full power of your existing security investment with security orchestration, automation, and response. With Splunk Phantom, you can execute actions in seconds, not hours. View our on-demand presentation and demo with Splunk and SGT on the power of Splunk Phantom's workflow engine. During the presen...
Adobe Experience Makers DHS Workshop Series
Government agencies are rebuilding their digital experiences with citizens and employees in mind. Through innovative and reliable programs, Adobe has been assisting in these efforts by offering solutions that increase efficiency and deliver memorable experiences to citizens, all while protecting confidential data and information within the public sector.Join us for just one or all three of these on-demand webinars in this Department of Homelan...
Achieving Mission Success Using Search-...
Siren and Carahsoft are excited to invite you to join us in our DoDIIS 2022 webinar series to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Electronic data sources in national security missions are increasingly more disparate, complex, and dependent on specific platforms. Intelligence analysts are overwhelmed by the number of existing and new data sources. Withou...
DoDIIS 2022 Webinar Series: SecOps Auto...
VMware SaltStack SecOps is a VMware vRealize Automation add-on that delivers continuous compliance and vulnerability remediation with the power of SaltStack Config automation. With SaltStack SecOps, security and operations teams can work together to define a corporate IT security policy, scan systems against it, detect vulnerabilities and non-compliance issues, and actively remediate them - all from a single platform. Attendees of this webinar...
DoDIIS 2022 Webinar Series: High Trust...
Anjuna and Carahsoft are excited to invite you to a webinar session leading up to DoDIIS 2022 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Anjuna's Confidential Computing is a new breakthrough technology that shields data during runtime and creates high trust environments in the hybrid cloud. It leverages modern hardware to create a secure enclave in which da...
Automate Evidence Collection: Manage Cy...
Is your GRC strategy enabling information security activities within your organization? Today's audit and compliance practices require time and resource-intensive information-gathering techniques that produce static and “point in time” results. Organizations can streamline information and evidence gathering by leveraging existing system data, creating objective evidence, maintaining compliance, and reducing risk. Join us for an inf...
Addressing Cloud Security Vulnerabiliti...
Please join Orca Security and Carahsoft for an informative session on cloud security vulnerabilities in the education sector hosted by Devin Crear, Sr. Cloud Security Representative, Orca Security, and Patrick Burke, Sales Engineer, Orca Security. Educational institutions continue to be the highest victimized sector even when compared to healthcare technology, financial services, and manufacturing. A recent study in the education sector found...
Protecting Critical Infrastructure
When most people think about connected devices, they think smartphones or tablets, but that's just the tip of the iceberg. All kinds of smart devices and sensors are connected to your network. Protecting your network isn't easy, but it's made more challenging when you don't have visibility into an increasing number of unmanaged sensors and IoT devices. Gigamon and Armis want to help eliminate your blind spots with Gigamon Visibility and Analy...
The Fundamentals of Application Securit...
As the nine time Gartner Magic Quadrant Leader, the Veracode team will touch on the best practices that have assisted many of their existing customers during this four-part webinar series. Upon completion of all four parts, you will be awarded a VeraTrack Education Certificate. In order to receive the certificate, you may either attend the live sessions, or view the on-demand recordings. View the full agenda and register for all four sessions...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.