Back to Search Begin New Search Save Search Auto-Notify
XD Vision: The Future of Multi-Domain A...
Attendees joined this webinar for an exclusive unveiling of XD Vision, the next-generation cross domain solution (CDS) from Owl Cyber Defense. Soon to be certified and approved for deployment, XD Vision is the world’s first and only CDS designed for secure, multi-domain audio (VoIP) and video (VTC & FMV) collaboration. XD Vision combines RTB-compliant security with an elegant, user-friendly interface, empowering operators and command...
Add Favorite
Outpacing the Digital Threat with Endpo...
Attendees of this webinar gained insight on Ivanti's Endpoint and Patch Management strategies. Key discussion points included:DISA Enterprise Patch Management System overviewManage any device and use cases (Windows, Linux, MacOS, ChromeOS, Android, and iOS)Outpacing strategies for the increase of Information Assurance Vulnerability alerts and CVEs
Add Favorite
Strengthening SLED Security
State and local governments are increasingly becoming the target of cyber attacks from bad actors, threats such as ransomware pose a serious risk, and many organizations are not prepare to respond quickly and effectively in the event of a cyber attack. Attendees heard how ServiceNow allows organizations to centralize their security workflows and reduce busywork for already overloaded security teams by utilizing automated workflows and AI. Perf...
Add Favorite
Advanced Insights for Federal Entrust P...
During this session, attendees deepened their understanding and enhanced their experience with our PKI solutions. Attendees also had the opportunity to:Gain advanced knowledge of PKI technologies and trends.Discover new ways to optimize their existing PKI setup.Network with other federal Entrust PKI users and industry experts.Product roadmaps and updates on nShield, KeyControl and more.We were joined by various speakers who provided insights i...
Add Favorite
Three Ways to Build Cyber Resilience Be...
How confident are you that you can detect external threats to your government organization? Cybersecurity teams are investing significant time and resources into internal monitoring, while making use of public data. With proliferating external factors to consider and an ever-increasing number of digital assets to monitor, it is becoming increasingly difficult to achieve continuous threat detection in a single environment.During this webinar, T...
Add Favorite
Navigating the Cybersecurity Landscape...
October is Cybersecurity Awareness Month, and to celebrate this important initiative, we hosted an engaging panel discussion titled Navigating the Cybersecurity Landscape in the Public Sector: Insights from Industry Leaders on October 24th at 2 PM EST. The panel featured experts from Arctic Wolf, AWS, and Zscaler, who shared critical insights into cybersecurity strategies, best practices for securing cloud services, and the latest trends in th...
Add Favorite
Human Risk: It's Not One Size Fits All
Your security starts and ends with people. Yet, human risk is still an unsolved problem for security teams of all sizes, with 68% of breaches involving a human element. View the on-demand recording to learn how organizations can transform the way they address human risk with Mimecast Engage, a revolutionized security awareness solution powered by Mimecast’s Human Risk Management Platform. Mimecast Engage leverages risk signals and behavi...
Add Favorite
Unlocking the Power of Bills of Materia...
As federal agencies face increasing cyber threats, the need for transparency and visibility into both hardware and software components has never been more critical. Join us for an insightful webinar where we dive into the importance of Hardware Bills of Materials (HBOMs) and Software Bills of Materials (SBOMs). Discover how BOMs help identify component-level vulnerabilities, manage end-of-life dependencies and mitigate risks before products ar...
Add Favorite
Securing Your Salesforce Data: Don't Fi...
Government, state, and local agencies are seeing an increased risk of losing mission-critical financial, health, and operational data. 41% of organizations are unable to recover with their current strategy. To top it all off, 95% of organizations have data protection challenges related to an inability to meet SLOs, cybersecurity requirements, and data hygiene needs for AI. Whether it’s a new administration, new policy frameworks, or orga...
Add Favorite
POAM Process Automation: Breaking the M...
In this webinar, we highlighted the critical role of Plans of Action and Milestones (POAM) in public sector cybersecurity, and why they matter now more than ever. We broke down the challenges security teams face when implementing POAMs, sharing real-life examples of where things go wrong and why. Attendees also learned the resource intensive math of POAM programs: people, systems, and time. It's time to shift the POAM paradigm. We showed you h...
Add Favorite
Back to Search Begin New Search