Back to Search Begin New Search Save Search Auto-Notify
CompTIA PenTest+: Everything you need t...
Penetration testers find and report vulnerabilities before they can be exploited. CompTIA’s PenTest+ is one of the best certifications to validate those skills, and it’s being updated to align with the most up-to-date hacking and pentesting skills requested by employers in 2021. Join Patrick Lane, Director of Products at CompTIA, to get the inside scoop on the latest PenTest+ changes, including: Updated PenTest+ domain areas and jo...
Add Favorite
CompTIA CASP+: Everything You Need to K...
Want to be an advanced cybersecurity practitioner? Then CompTIA’s CASP+ certification may be the perfect fit for you. The popular certification is getting an overhaul heading into 2022 to ensure it validates the most relevant and in-demand skills — from security architecture and operations to engineering and governance. Join Patrick Lane, Director of Products at CompTIA, to get the inside scoop on the latest CASP+ changes, includin...
Add Favorite
Digital Forensics Careers: Fact vs. Fiction
Forget what the crime scene TV shows have told you — digital forensics is not done on an overhead projector while the whole department watches! Learn about the day-to-day work of a digital forensics professional from a team of experts who have been putting in the work for decades! In this one-hour live event, you will learn: The types of tools you'll use to help bring criminals to justice Why a lack of technical experience isn’t a...
Add Favorite
Building Cyber Resiliency for Your Crit...
During this webcast, we were joined by Forescout's Vincent Turmel, Strategic Alliances Director of OT Partnerships, and Carahsoft's Nikhil Gupta, Forescout SE Team Lead to discuss how eyeInspect can do the following: Provide quick identification of cyber risks like the presence of vulnerabilities on a specific device and operational risks like out-of-range process values. Give visibility into process data and identification of previously unkno...
Add Favorite
Free Yourself: Secure & Efficient EHR D...
Zscaler, a leading cloud cybersecurity company founded on Zero Trust principles, wants to help you save money, improve your clinical experience, and enhance your security posture. When tech companies are bought by investment banks and taken private, it historically means painful times for the company’s customers, including rate hikes, poor support, and contract lock-ins. These weaknesses are further exploited by the bad guys, and right...
Add Favorite
Stop Breaches & Reduce Cyber Risk with...
K-12 and Higher Education organizations are being targeted by threat actors more than ever. In this presentation we discussed the threat landscape and how to leverage threat intelligence, EDR, MDR, and Identity Protection to keep you protected. Attendees joined KCAV, CrowdStrike, and former CISO of the State of Oklahoma, Matt Singleton, to discuss how CrowdStrike stops breaches and is reducing cyber risk for their customers. Matt has tremendou...
Add Favorite
The Evolving Landscape of Email Securit...
During this webinar our expert discussed how organizations can increase their cyber protection – not only protecting themselves against the latest evolving threats, but also how to ensure they are meeting insurers’ requirements for proper coverage.
Add Favorite
Wiz: Advancing Cloud Security with Zero Trust
In today's ever-changing threat landscape, government agencies need a cloud security platform that can keep up. Wiz is a CNAPP platform that provides visibility and context into your cloud environment, helping you to implement Zero Trust security. As DoD spokesperson John Kirby said recently about the recent infiltration, "Cybersecurity is something you don't fix and walk away from. Cybersecurity is something you need to stay on top of every s...
Add Favorite
Scalable Compliance for Small Businesses
What does it mean to be compliant in the world for federal contracting? It means you can follow the government's guidelines and regulations in order to do business with them. It can also entail having the right security clearance and measures in place to secure sensitive data. If your team is unsure if you have the right levels of compliance, this webinar is for you! Join us and our good partner, REXOTA Solutions LLC for this important discussion!
Add Favorite
Identity Security for the Public Sector...
Ransomware and other cyber threats targeting the public sector are on the rise. Today's attackers often have a common focus: infiltrating your identity systems, typically Active Directory (AD) or Azure (now Entra ID) for most organizations. An identity breach can lead to data theft, malware insertion, and ransomware attacks that can shut down the entire network — and your operations. Protecting the identity perimeter requires an understa...
Add Favorite
Back to Search Begin New Search