Back to Search Begin New Search Save Search Auto-Notify
How to Use ThreatAlert and FASTTR on AW...
If you are a Federal Contractors or Government Agency looking to provide secure and compliant cloud solutions that meet Zero Trust Architecture requirements, then this webinar is an excellent resource for you. In this webinar, you will learn about getting ATO Ready with a Zero Trust Architecture on AWS, as well as the benefits of being ATO ready, such as: Dedicated government Zero trust landing zone compliant with FedRAMP and GSA requirements...
Add Favorite
Unlocking Data to Drive Smarter and Saf...
Organizations spend billions annually on technology to ensure visibility, control, and security over servers, workstations, firewalls, and other IT assets. But data that powers the most costly, critical, and longest-lived defense assets goes largely uncaptured and unknown. Shouldn't you have at least the same observability into a $100M weapon system as you do for a $500 laptop? Planes, tanks, and other weapon systems are composed of thousands...
Add Favorite
Elevating Government with Google Looker
During this webinar, we will cover: Data experience Customer experience - exec order Cyber and log analytics case study
Add Favorite
Prioritizing Funding: New Efforts to Ke...
Recent cyber attacks have targeted everything from critical infrastructure companies to local government offices. It is clear this trend will only continue as adversaries and criminal organizations find ways to exploit network vulnerabilities. In response, new legislative momentum supports increased funding efforts as we are seeing with the Bipartisan Infrastructure Bill. This episode will explore the growing need to strengthen resilience of b...
Add Favorite
Tap into DHS Cyber Grants Funding to St...
The Biden Administration recently issued a statement warning of potential cyberattacks against U.S. organizations, as tensions rise between Russia and the rest of the world. Potential attacks to state and local critical infrastructure would disrupt the lives of millions of Americans, affecting lifeline services such as power, water, healthcare services, and supply chains. State, tribal and municipal government organizations need clear visibili...
Add Favorite
Cybersmart TV: Cloud Security
Government organizations are storing, accessing and sharing more of their data in the cloud than ever before. The cloud gives agencies more flexibility, while at the same time, creates more risk. This webcast will be a conversation on finding the necessary balance between increased collaboration and productivity with maximum security and safety.
Add Favorite
Google Cloud Work Safer Webinar with Cr...
In this on-demand webinar, you will learn about: Adversaries targeting public sector organizations and how to prepare to stop them How Google Cloud and CrowdStrike's integrated solutions provide proactive automation for threat hunting with shared intelligence across endpoints and workloads for a defense-in-depth infrastructure New strategies to achieve the highest levels of visibility, simplicity, and control to build stronger cybersecurity de...
Add Favorite
Genius Machines
Artificial intelligence has evolved from a staple of science fiction to a real world, strategic priority of the United States. Increases in computing power and the emergence of large data sets to train ever more powerful machine learning algorithms have created real world applications and success stories. During this bi-annual series, Defense One and Nextgov will explore all aspects of artificial intelligence and its applications in government.
Add Favorite
BeyondTrust FSI Roundtable Webinar
The Office of Management and Budget issued its guidance in January on meeting the requirements for agency networks to implement a Zero Trust architecture strategy. The mandate seeks to defend against sophisticated penetrations by adversaries, emphasizing identity management and access controls are key components of the strategies. Taken together, identity and access controls mean that privileged access management (PAM) is essential. Federal ag...
Add Favorite
2022 Red Hat Security Symposium On Demand
Join our on-demand Security Symposium webinar series, where IT security professionals can learn from Red Hat® and Intel security experts, partners, and peers to solve security issues together as a community. This Security Symposium is an on-demand, six-session webinar series with presentations from experts discussing hybrid cloud security challenges that organizations face and solutions to tackle these challenges. During this series, we...
Add Favorite
Back to Search Begin New Search