5 Steps to Comprehensive Data and Threa...
Many state and local government entities face increasingly complex challenges when it comes to keeping important data secure. Today there are more users, devices, applications, and data outside the organizational datacenter than inside. This network inversion introduces new blind spots, leaving agencies vulnerable to a new crop of cloud-enabled and credential-based attacks. Please join Netskope for a webinar to discuss how Netskope has partner...
Find the Malicious Code Hiding on Your...
80% of web pages contain at least one third party library security vulnerability. Script threats like web skimming, formjacking, and Magecart attacks can steal data from visitors to your website. Content from third party sources are increasingly becoming major attack vectors for script attacks, which take advantage of compromised web tools you need. Join Akamai and Carahsoft for a complimentary webinar on June 24th to learn how you and your ag...
Splunk 101 for Nonprofits
Join Splunk & SGT and learn how Splunk for Good helps nonprofits secure their data infrastructure, ensure operational efficiency, and create new innovative solutions that power their overall mission. Splunk for Good transforms the connective power of data into a strategic asset for nonprofits, universities, organizations, and people working to do good in the world. Through expertise, tools, training, and personalized support, we help simpl...
Protecting Government and Corporate Sup...
Supply chain complexity is rising, and the public and private sectors are stronger together. The resulting approach is called cyber collective defense, and it's changing how businesses and the federal government protect their supply chains.Join IronNet Cybersecurity, Amazon Web Services (AWS), and Carahsoft on June 25th for an insightful webinar on how a collective defense strategy allows federal agencies to:Better understand their threat land...
Moving to the Cloud with Operational Security
Federal agencies are under pressure to streamline and modernize infrastructure to reduce costs – and at the same time, they must also improve security. In this era of cloud computing, security products must work together seamlessly, and agency security teams need solutions to defend and protect government assets in the cloud. Cloud computing requires agencies and their security partners to focus on both securing data on-premise and data...
Transform Endpoint Security with VMware...
In 2020, cyber defenders have seen a high level of innovation from cybercriminals, who are leveraging new tactics, techniques, and procedures (TTPs) to maintain persistence and counter incident response efforts. At an alarming rate, transnational organized crime groups and spies are leveraging cybercrime tools and services to conduct a wide range of crimes against government agencies and financial institutions. Criminals are increasingly shari...
Introduction to Cryptocurrency Concepts
What Government Agencies, Regulators, and Investigators Need to Know As government agencies, regulators, and investigators look to more accurately assess the risks associated with the nascent industry of cryptocurrency, it is important to identify key players within the ecosystem. This complimentary webinar will cover the various typologies across the cryptocurrency space including gambling sites, hosted wallets, mining pools, high-risk exchan...
IT Service Delivery for Distributed Wor...
Join Splunk, Forescout, and Alchemy Global to see how our solution will secure IT service delivery for distributed workforce enablement. With an unprecedented growth in remote connections, our workforce faces a new host of logistical constraints and a larger attack surface than ever before.Before we build an effective remote workforce program, we must ask these questions:How many endpoints are connected at any given time?Are those endpoints co...
Zero Trust Security for the Digital Workspace
Security is an ongoing challenge for organizations and with today’s dynamic workforce, the challenge is ever-increasing. Rapidly changing work styles and increased use of SaaS applications have resulted in the End-User Computing Zero Trust model becoming one of the most important forms of alternative security, an architectural mindset aimed at securing and protecting your data. VMware Workspace ONE combines Zero Trust conditional access...
Collective Defense and the Global Cyber...
Recent years have shown a massive expansion of the global cyber attack surface. The proliferation of IoT and smart devices plus the speed and scale of communications have created an environment that makes it easier for adversaries to exploit vulnerabilities in federal systems.Combined with the current work environment and the emergence of new threat vectors from key adversaries, we are entering a more dangerous cyber threat landscape than ever...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.