Back to Search Begin New Search Save Search Auto-Notify
Leveraging Dark Web Intelligence for Re...
Attendees of this webinar learned about how in today's world, Open Source Intelligence (OSINT) plays a critical role in uncovering threats and mitigating risks by leveraging publicly available information. This webinar dove deep into the practical side of OSINT investigations, focusing on how dark web data can be strategically utilized to enhance threat detection and risk assessment for organizations. During this webinar, the Director of Intel...
Add Favorite
Emerging Tech and Government Spending f...
Marion Square and Carahsoft held an event designed to equip technology companies with the knowledge and strategies needed to navigate and succeed in the evolving landscape of federal government spending on emerging technologies for FY25. During this event, attendees gained:Insights into Federal InitiativesAgency Specific OpportunitiesActionable Strategies
Add Favorite
Supercharging Third-Party Risk Manageme...
Attendees of this webinar learned about: Identify Emerging Third-Party Threats in Real Time: Gain immediate visibility into risks across your supply chain with real-time alerts from Dataminr PulseCorrelate Threat Intelligence with Internal Data: Leverage Splunk’s analytics to contextualize external threats, identifying their potential impact on your organizationAccelerate Incident Response: Quickly detect, investigate, and respond to thi...
Add Favorite
Do You Trust Me? The Basis of ZTA Archi...
In this webinar experts from Commvault and ATP Gov explored integrating security into every aspect of the information architecture, aligning with NIST’s Cybersecurity Framework. Despite the extended deadline to 2027, agencies must leverage AI, automation, and advanced strategies to fortify their zero-trust frameworks. Further, they discussed the concept of cyber resilience and its crucial relationship to ZTA, ensuring a comprehensive and...
Add Favorite
AI Agents for OSINT, Fraud, and Threat...
Thank you for your interest in our Overwatch Data webinar: AI Agents for OSINT, Fraud, and Threat Intelligence! In today’s rapidly evolving threat landscape, manually monitoring OSINT and illicit spaces across social, deep, and dark web sources leaves organizations vulnerable to missed threats. Watch Overwatch Data's webinar that explores how AI agents can automate cyber and fraud threat intelligence - prioritizing risks, delivering acti...
Add Favorite
Strengthening DoD Cyber Resilience
In the rapidly evolving threat landscape, the Department of Defense faced unprecedented challenges in maintaining robust cybersecurity across its vast digital infrastructure. This workshop brought together two leading solutions in cyber defense, Armis and AttackIQ, to offer a comprehensive approach to strengthening your organization's security posture. Armis Overview Discovering and managing an accurate, unified and continuous asset inventory...
Add Favorite
Navigating the Weaponization of Supply Chains
Access this webinar to learn how geopolitical dynamics are reshaping global supply chains and impacting government procurement strategies. This webinar covered real-world examples of supply chain weaponization, highlighting risks from dependence on foreign suppliers, especially those threatening U.S. security. Topics included trade restrictions, material shortages, and cybersecurity threats, with actionable strategies for building resilient, s...
Add Favorite
Fortifying the Future: Protecting 3rd a...
As supply chains become increasingly digital and interconnected, cybersecurity risks from partners and suppliers are evolving at an alarming pace. Cyberattacks targeting 3rd and 4th party supply chain networks—ransomware, data breaches, and third-party vulnerabilities—can have devastating consequences on your company. With more Governments looking to increase regulations to ensure organisations secure 3rd and 4th party providers, o...
Add Favorite
Is Continuous Threat Exposure Managemen...
In today's dynamic threat landscape, organizations, especially within the State, Local and Education sectors, face the challenge of enhancing their cybersecurity posture without overhauling existing systems.Gartner's Continuous Threat Exposure Management (CTEM) framework offers a strategic approach to continuously refine and optimize security measures.During this webinar, attendees learned:How to implement Gartner's CTEM framework without over...
Add Favorite
How to Protect Assets in a Connected Wo...
Attendees were joined by Connor Rhodes, Enterprise Solutions Engineer at Verkada, on Thursday, March 27th, as he walked through:Cybersecurity principles for both on-prem and cloud-based systemsHow to safeguard risks that organizations face todayAnd so much more about Verkada's security solutions for state and local government organizations
Add Favorite
Back to Search Begin New Search