Sensible Machine Learning
Join our webinar to learn how Sensible ML is changing the game for FP&A teams and business analysts. As the first and only time-series ML forecasting solution purpose built for enterprise performance management (EPM), Sensible ML provides FP&A teams and business analysts with capability to create hundreds or thousands of financial and granular operational forecasts at a fraction of the total cost of alternative solutions. Instead of ta...
Conquering Complexity in the Financial Close
Join this live demonstration of OneStream’s Intelligent Finance platform to learn how your organization can modernize finance, simplify and align processes and extend your investment across the organization with OneStream MarketPlace solutions. In this webinar, you will learn how: OneStream streamlines financial close and consolidation OneStream supports the most complex intercompany eliminations, ownership structures and accounting stan...
Creating Agile Reporting with Excel ...
Join our live demo webinar to learn how Finance users can leverage OneStream’s Excel Add-in and native Spreadsheet feature for data entry, reporting, and analysis while letting the platform provide control and governance on the back end. In this webinar, you will learn: How OneStream’s direct integration with Excel enables finance to provide line of business analysts with secure, self-service access to the appropriate data for thei...
Zero Trust and the Power of Isolation f...
With the growing threat of cyber attacks, DHS’s Cybersecurity and Infrastructure Agency (CISA) and the White House have recently released guidelines for agencies to adopt a Zero Trust approach to cybersecurity. Isolation is paramount to Zero Trust Architecture. Isolation creates a virtual "air gap" between the network end user and the online world. Instead of opening a website directly, the end user sees a sanitized version of it with al...
Digital Risk Reconnaissance Across the...
Organizations face a myriad of risks brought about by the digital transformation of their business. These risks include digital fraud, data theft exposure, social media impersonations and phishing attempts within social media and the hidden areas of the open, deep and dark web.Join CrowdStrike's upcoming Tech Talk as they go over CrowdStrike Falcon X Recon™, created to expose the criminal underground and enable organizations to better pr...
Hybrid Threats: The Synthesis of Advanc...
Today’s most advanced nation-state adversaries, to include groups originating from within Russia, China, Iran, and North Korea, are engaged in cyber operations that blur the lines between nation-state objectives and organized crime. Whereas many nations have difficulty controlling cyber-crime originating from within their borders, the above-aforementioned nations are complicit with several major organized crime groups. Accordingly, the p...
Nation-State Threat Landscape Overview: Iran
Join CrowdStrike for a deep dive into the nation-state threat landscape of Iran. Jason Rivera, Global Director - Strategic Threat Advisory Group at CrowdStrike, will give a brief on the broader geopolitical context for the latest Iranian cyber activities, an overview of the primary threat actors responsible for Iranian offensive cyber operations, and these actors’ TTPs (tactics, techniques, and procedures). He will also share mitigation...
Nation-State Threat Landscape Overview: China
Join CrowdStrike for a Join CrowdStrike for a deep dive into the nation-state threat landscape of China. Joshua Shapiro, CrowdStrike’s public sector threat intel SME, will give a brief on the broader geopolitical context for the latest Chinese cyber activities, an overview of the primary threat actors responsible for Chinese offensive cyber operations, and these actors’ TTPs (tactics, techniques, and procedures). He will also share...
The Evolution of Ransomware for Governm...
Financially motivated transnational criminal groups, primarily operating out of eastern Europe, Russia, and Iran have found ransomware to be a powerful tool for profit generation. The targeting of U.S. state and municipal governments, healthcare institutions, critical infrastructure providers, and our nation’s universities coupled with the rise of big game hunting, ransomware as a service, and increased collaboration between adversarial...
Protecting Our Nation’s Election Infras...
Across the globe, elections are under threat of manipulation and interference. Adversaries increasingly attempt to use offensive cyber operations to directly affect political outcomes. From intelligence collection and “hack and leak” campaigns to election infrastructure targeting, nation-state adversaries around the globe see election interference as a means to advance their national security and political interests. Although diffe...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.