Back to Search Begin New Search Save Search Auto-Notify
Defend Smarter: Leveraging AI to Maximi...
Are you struggling to keep up with ever increasing security compliance and regulatory requirements? Is your team tired of manually intensive and labor some work for keeping up compliance efforts? Unlock the potential of automated and continuous security compliance and risk management to fortify your organization's defenses. Attendees joined us to learn more about:Regulations and industry standards driving cybersecurity efforts in the public se...
Add Favorite
How AI is Revolutionizing Government Co...
Regscale and Carahsoft joined forces in the lead up to TechNet Cyber 2024 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. As the landscape of government regulatory compliance evolves at an unprecedented pace, navigating the labyrinth of regulations while maintaining operational efficiencies has become increasingly daunting. Staying ahead of the curve is no longe...
Add Favorite
Why MDR Requires a Holistic, Cost-Effic...
Splunk is a leader in security and observability, with customers of all shape and sizes that leverage flexible sizing models, free toolkits, and best-in-class network monitoring data management. Attendees joined us to gain insights into:The growing threat landscape for school districts and municipalitiesCritical factors to consider when choosing an MDR solution providerExtracting deeper security value from your systems and security log dataDev...
Add Favorite
Unmasking Cyber Shadows: Enhancing Cybe...
Meet a powerful ally in the world of Cybersecurity: Constella Intelligence's Deep OSINT investigations fueled by AI, it taps into the world's largest breach data lake collected from the surface, deep and dark web.Join us to learn how agencies can leverage deep OSINT to:Disrupt crime at its source by uncovering synthetic Identities Conduct cybercriminal identify graphing to unveil threat actors at the individual level Achieve greater scalabilit...
Add Favorite
AI and State-Sponsored Espionage - A We...
Attendees joined Google Cloud, Mandiant, and GuidePoint Security for panel discussions focused on the dangers of state-sponsored cyber espionage and how Artificial Intelligence (AI) is rapidly changing the world and, with it, the landscape of cyber threats.AI is being utilized by both attackers and defenders, with the adversarial use of AI posing a growing concern.Recent trends indicate that cyber espionage is on the rise, and the employment o...
Add Favorite
Achieving Cybersecurity Resilience in S...
New Mexico recently issued Executive Order 2024-011, a comprehensive state-wide security assessment to identify vulnerabilities in cybersecurity and necessitates that all state agencies adopt the National Institute of Standards and Technology (NIST) standards for cybersecurity by November 1, 2024. Attendees explored how Synopsys can help teams navigate the requirements of EO 2024-011 by securing critical applications. Stream the webinar to lea...
Add Favorite
Combatting Emerging Threats: Proofpoint...
Proofpoint, BluVector and Carahsoft are excited to invite you to join us in the lead up to TechNet 2024 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. The digital evolution is moving quick, and it’s easy to be overwhelmed and click (or scan) something you shouldn’t have. Join us for an exclusive webinar where experts from Proofpoint and BluVector wi...
Add Favorite
Shielding Helpdesk Operations Against S...
The Scattered Spider attack on MGM represented a significant breach in cybersecurity measures, disrupting the company’s services and jeopardizing customer data, all from a call into the helpdesk. The breach illustrated an identity gap in identity and access management, highlighting the significance of Caller ID Verification in fortifying helpdesk security protocols. This attack has shown the impact of an inability to ensure the identity...
Add Favorite
No Room for Doubt: Mastering the Cyber...
Unexpected downtime from a cyberattack can be costly for your customers. From lost productivity, reputation or data, having critical systems go down can cause serious damage, especially if there is not a recovery plan in place. Your customers need security and confidence in the recovery, leaving no room for doubt that their systems have clear plans in place to mitigate risk and impacts of cyberattacks.Join Veritas and Carahsoft for an extensiv...
Add Favorite
Cyber Lakehouse for the AI Era, ZTA and...
Many agencies today are struggling not only with managing the scale and complexity of cyber data but also with extracting actionable insights from that data. With new data retention regulations, such as M-21-31, compounding this problem further, agencies need a next-generation solution to address these challenges. Attendees of this webinar explored how organizations can build their next-generation cyber lakehouse. They looked at how agencies c...
Add Favorite
Back to Search Begin New Search