Back to Search Begin New Search Save Search Auto-Notify
Risk and Reels: A Cybersecurity Podcast...
Hackers, curiosity, security, pen-testers, kindness, analogies and Hollywood criminals. Welcome to the first episode of Risk and Reels with Jeffrey Wheatman, featuring Jayson Street (OG Pen Tester and Chief Chaos Officer for Trusec), a self-proclaimed hacker. WHAT IS RISK AND REELS: A CYBERSECURITY PODCAST? A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheat...
Add Favorite
Mastering DoDD 8140.03M: A Deeper Dive...
In this informative session, our experts guided you through the key aspects of the directive and helped you navigate the path to compliance. By attending this webinar, you learned about: Qualification Matrix Residential Qualifications Privileged User qualifications and tracking (including SAAR/DD2875 forms) Incorporate Proficiency Level Handling Contractors Register to view this on-demand recording.
Add Favorite
Data Movement Across All Environments
Discover use cases in which Cloudera DataFlow (CDF) and Cloudera Data Platform (CDP)'s data in motion tools are being utilized by Department of Defense agencies to provide access to all observable data in real time and contextualize it with industry data for more informed decision-making with maximum efficiency and agility. Join us for a deep dive into Cloudera's data in motion features and how they leverage Apache NiFi to: Provide a m...
Add Favorite
Zero Trust & SecOps Automation: The Fut...
Department of Defense (DoD) agencies are taking concrete steps to transition to a zero-trust architecture to protect critical data and systems. Transitioning to a zero-trust architecture requires a fundamental reimagining of security operations centers (SOCs) and teams. SOCs have traditionally been structured around the role of the security operator, rather than the data and lacked both automation and DevOps practices. To establish a true zero...
Add Favorite
Mastering the DoD Zero Trust Journey: B...
In a rapidly changing digital landscape, federal agencies face a constant battle against cyber threats. With the stakes higher than ever, you need a strategic advantage to safeguard your agency's sensitive assets and ensure the resilience of the Department of Defense network environment. Embracing the DoD Zero Trust Strategy is the key to unlocking this potential and positioning yourself as a hero in this evolving story. View the engaging webi...
Add Favorite
How to Resist Ransomware
Hear from federal cyber leaders at DOD and CyberArk on the best tips, tricks and strategies for resisting ransomware and protecting federal data. Ransomware attacks against federal IT systems surged to unprecedented levels at the beginning of the COVID-19 pandemic and show no sign of abating, with ransomware losses surpassing $1 billion in the second half of 2021. Federal agencies handling mission-sensitive medical, financial, demographic and...
Add Favorite
Navigating the Zero Trust Maze
The federal government’s emphasis on cybersecurity for all agencies has had a dizzying effect on the regulatory environment. Agencies must address Executive Order 14028, mandating a zero trust architecture by September 2024. To get there, they must navigate through the General Services Administration’s approved cloud offerings in the Federal Risk And Management Program (FedRAMP). Then there are the National Institute of Standards a...
Add Favorite
Network Automation for EUCOM, AFRICOM ...
Network automation is critical to support the increasing application and workload needs of the U.S. Department of Defense (DoD). Red Hat Ansible, a foundation for building and operating IT automation at scale, provides improved control over and visibility into network resources, bringing real-time decision-making capabilities to the warfighter. EUCOM, AFRICOM & OCONUS colleagues attended a hands-on workshop participating in the application...
Add Favorite
TDM Transformation: Transforming Missio...
Time Division Multiplexing solutions are slowly being transitioned off. Nokia and TDM experts discussed ways you can transform U.S. Federal mission-critical legacy networks off these infrastructures. Attendees learned about transforming mission-critical communication networks with Time Division Multiplexing (TDM). Transitioning off these legacy TDM solutions can be costly and disruptive for the end-user. Attendees learned that costs could incl...
Add Favorite
Aligning with Key U.S. Army Priorities...
In this on-demand webinar, attendees learned how Joint All Domain Command and Control aims to connect the digital battlespace from the tactical edge back to the enterprise across Unified Network Operations to ensure: Well-informed, rapid decisions in all domains—air, land, maritime, space and cyberspace—in both competition and armed conflict Unmatched capabilities for enabling JADC2, UNO, ZTA and other U.S. Army and DOD modernizati...
Add Favorite
Back to Search Begin New Search