Hybrid Cloud Best Practices
Hybrid cloud strategy allows agencies to determine which applications and data should reside on which areas of a hybrid cloud infrastructure. Simply, hybrid cloud defines what goes on public cloud infrastructure, and what goes on private cloud infrastructure. A hybrid cloud platform provides agencies many advantages to include greater flexibility, more deployment options, security, compliance, and ability to derive more value from existing inf...
AUSA's Noon Report - James Lechner
AUSA’s Noon Report webinar series features presentations by senior Army leaders responsible for key programs and initiatives, as well as contemporary military authors who weave together the past, present and future story of the United States Army. AUSA’s Noon Report Webinar series invites you to join us on Thursday, 6 June 2024, at 12:00 EDT to hear a presentation by James Lechner, author of With My Shield: An Army Ranger in Somali...
Industrial Control Systems Summit Solut...
Adversaries targeting critical infrastructure systems (power grids, water management systems, heavy manufacturing, oil and gas refineries and pipelines, etc.) have demonstrated detail technical knowledge of control system components, industrial protocols, and engineering operations. These skilled and brazen adversaries continue to launch a combination or Ransomware and targeted ICS tailored attacks against the safety and reliability of critica...
AI & ML in Records Management
Artificial Intelligence (AI) and Machine Learning (ML) are rapidly changing the way records managers track the data they have, from where it is located to who can access it to what information it contains. These technologies are also changing how agencies meet compliance requirements. In this virt ual workshop, we break down these concepts and show the potential benefits to your agency. You will leave with a better understanding of how AI/ML c...
AUSA's Noon Report - HON Rachel Jacobson
AUSA’s Noon Report webinar series features presentations by senior Army leaders responsible for key programs and initiatives, as well as contemporary military authors who weave together the past, present and future story of the United States Army. Please join us on Tuesday, 25 June, at 12:00 PM EDT, to hear a presentation by HON Rachel Jacobson, Assistant Secretary of the United States Army Installations, Energy and Environment. HON Jaco...
SANS 2024 SOC Survey: Facing Top Challe...
In 2024, the SOC Survey continued to explore the detailed aspects of cybersecurity operations centers. The survey collected information on organizations’ capabilities, and what is outsourced. On this webcast, SANS Senior Instructor Chris Crowley examines survey results to understand how SOCs are architectured, favorite and frustrating technologies, staffing, funding, threat intel, and automation. Register for this webcast now, and you wi...
AUSA's Noon Report - William S. Nance
AUSA’s Noon Report webinar series features presentations by senior Army leaders responsible for key programs and initiatives, as well as contemporary military authors who weave together the past, present and future story of the United States Army.AUSA’s Noon Report Webinar series invites you to join us on Tuesday, July 16 2024, at 12:00 EDT to hear a presentation by William Nance, author of Commanding Professionalism: Simpson, Moor...
SANS 2024 Top Attacks and Threats Report
The 2024 Top Attacks and Threats Report and webcast will once again dig deep into the emerging threats discussed during the annual SANS keynote panel discussion at the RSA® Conference 2024. SANS author and chair Domenica Crognale will discuss attacker trends and mitigation strategies and provide suggestions on how organizations can better position themselves to get ahead of these attacks. Topics will focus on: Briefing of the most dangerou...
Digital Forensics and Incident Response...
Cybercrime continues to evolve, and as forensic analysts and incident responders, we often are in a virtual arms race with the criminals. While the best tool in both art and science is the amazing capacity of the human brain, and this is especially apparent in the field of digital forensics and incident response, where we match ourselves against the creative ingenuity of committed and capable criminals; we do need other tools to make our work...
Threat Hunting Summit Solutions Track 2024
The cybersecurity workforce has exploded in recent years, with more than 1 million available jobs posted in 2023 alone. Daunting is the fact that the demand for skilled employees more than doubles the currently available workforce. Even for the most seasoned professionals, there is a desperate need to stay on top of the latest attack trends, vulnerabilities and exploits, and to constantly vet the myriad of available tools touted to do the job,...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.