Back to Search Begin New Search Save Search Auto-Notify
Using More and Better Data: Why Digital...
State and local governments can address many of their greatest challenges with better understanding and use of their data. From measuring the effectiveness of a program and improving it to scaling program delivery and integrating partners, data can allow governments to accelerate change through superior coordination of services and activities. But access to quality data requires some level of digital transformation. Outdated solutions and spr...
December 12, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
Get Insights from Data Faster with Clou...
State and local governments have access to a wealth of data, yet many agencies are still starved for valuable insights. Gaining insights from data can be a lengthy process – it requires a thorough understanding of and speedy access to data, the ability to analyze data and a method to present findings for further consumption. This process has been coined as ‘time to insight.’ As more agencies seek to leverage data, many are a...
December 12, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
ICS Consequence-Driven Incident Respons...
Consequences of modern cyber-attacks impacting control systems can range from large power grid blackouts to large cities or major regions, failure of critical manufacturing equipment with massive financial loss, paralyzing smart city infrastructure such as transportation in large municipalities, inflict serious environmental damage, or worse, cause injury or death to facility workers. The obvious choice for ICS security managers and technical...
December 9, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Mobile World Live: Unwrapped Digital Ev...
An innovative digital event series brought to you by Mobile World Live – the industry’s premier source of news and insight. Our Unwrapped event will offer a full week of exclusive live content, featuring daily keynote interviews and webinars – in partnership with the expert analysts at GSMA Intelligence. We’ll host preeminent authorities and top executives from companies leading the way in their fields to discuss, debat...
December 6-9, 2022
Organizer: GSM Association
Location: Webcast
Add Favorite
The State of Encrypted Attacks: What's...
A vast majority of today's attacks use encryption to bypass defenses. Zscaler's ThreatLabz team analyzes data from the world's largest security cloud, processing over 250 billion transactions per day, to uncover what threats are hiding in SSL/TLS. Join this webinar to learn and discuss how encrypted attacks are evolving, including: The fastest growing threat types The most targeted industries/geographies Where most enterprise defense strategie...
December 8, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
SANS 2022 Multicloud Survey: Exploring...
SANS research has shown that more organizations are using multiple cloud providers. Multicloud adoption can be driven by a variety of factors, such as competitive differentiation, mergers and acquisitions, and more. This event explores various results from the SANS 2022 Multicloud Survey, including multicloud adoption trends, how adoption decisions are made, and—most importantly—what cybersecurity teams are doing to cope with the o...
December 7, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Purple Teaming to Enhance Detection Eng...
The practice of purple teaming brings together the efforts of red and blue teams and can help organizations easily find visibility gaps in their tooling as well as validate detection logic used to catch threats in their organization. Join this webinar, to learn more about: The benefits of purple teaming and how to automate parts of purple teaming with tools The Splunk Attack Range for purple teaming and detection development Enhanced detection...
December 6, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Top 3 SOAR Use Cases: Tips and Best Pra...
In this session, Enrico Benzoni and Andrea Fumagalli will explain how to build and optimize the top three SOAR use cases, sharing invaluable tried-and-true technical details for solving your needs. The fastest security response is not always the right one. However, minimizing response time by prioritizing security incidents, reducing false positives, and quickly investigating alerts is one of the imperatives of successful cyber defense. Noneth...
December 6, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Threat Exposure Management Solutions Forum
Threat Exposure Management (TEM) is a new approach to security designed to help organizations identify, prioritize and manage unexpected risks or exposures. This approach differs from standard threat management practices by taking a contextual view of threats, focusing on establishing a process for how information is collected and integrated together to inform better and faster decision making. Though the term, threat exposure management, is n...
December 2, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Next Generation ZTNA - All of the Benef...
Remote work has upended security. Sadly, in reaction, security vendors have developed two substandard solutions: VPN and ZTNA. VPN server ports must be open to the internet and anyone on the internet can try to hack it. ZTNA suffers degraded performance while obfuscating identity creating a huge security blindspot. In this webinar, learn about Zero Networks’ ZNConnect which combines the best aspects of VPN and ZTNA while eliminating thei...
December 1, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Back to Search Begin New Search