Leveraging Dark Web Intelligence for Re...
Attendees of this webinar learned about how in today's world, Open Source Intelligence (OSINT) plays a critical role in uncovering threats and mitigating risks by leveraging publicly available information. This webinar dove deep into the practical side of OSINT investigations, focusing on how dark web data can be strategically utilized to enhance threat detection and risk assessment for organizations. During this webinar, the Director of Intel...
Emerging Tech and Government Spending f...
Marion Square and Carahsoft held an event designed to equip technology companies with the knowledge and strategies needed to navigate and succeed in the evolving landscape of federal government spending on emerging technologies for FY25. During this event, attendees gained:Insights into Federal InitiativesAgency Specific OpportunitiesActionable Strategies
Supercharging Third-Party Risk Manageme...
Attendees of this webinar learned about: Identify Emerging Third-Party Threats in Real Time: Gain immediate visibility into risks across your supply chain with real-time alerts from Dataminr PulseCorrelate Threat Intelligence with Internal Data: Leverage Splunk’s analytics to contextualize external threats, identifying their potential impact on your organizationAccelerate Incident Response: Quickly detect, investigate, and respond to thi...
Do You Trust Me? The Basis of ZTA Archi...
In this webinar experts from Commvault and ATP Gov explored integrating security into every aspect of the information architecture, aligning with NIST’s Cybersecurity Framework. Despite the extended deadline to 2027, agencies must leverage AI, automation, and advanced strategies to fortify their zero-trust frameworks. Further, they discussed the concept of cyber resilience and its crucial relationship to ZTA, ensuring a comprehensive and...
AI Agents for OSINT, Fraud, and Threat...
Thank you for your interest in our Overwatch Data webinar: AI Agents for OSINT, Fraud, and Threat Intelligence! In today’s rapidly evolving threat landscape, manually monitoring OSINT and illicit spaces across social, deep, and dark web sources leaves organizations vulnerable to missed threats. Watch Overwatch Data's webinar that explores how AI agents can automate cyber and fraud threat intelligence - prioritizing risks, delivering acti...
Strengthening DoD Cyber Resilience
In the rapidly evolving threat landscape, the Department of Defense faced unprecedented challenges in maintaining robust cybersecurity across its vast digital infrastructure. This workshop brought together two leading solutions in cyber defense, Armis and AttackIQ, to offer a comprehensive approach to strengthening your organization's security posture. Armis Overview Discovering and managing an accurate, unified and continuous asset inventory...
Navigating the Weaponization of Supply Chains
Access this webinar to learn how geopolitical dynamics are reshaping global supply chains and impacting government procurement strategies. This webinar covered real-world examples of supply chain weaponization, highlighting risks from dependence on foreign suppliers, especially those threatening U.S. security. Topics included trade restrictions, material shortages, and cybersecurity threats, with actionable strategies for building resilient, s...
Fortifying the Future: Protecting 3rd a...
As supply chains become increasingly digital and interconnected, cybersecurity risks from partners and suppliers are evolving at an alarming pace. Cyberattacks targeting 3rd and 4th party supply chain networks—ransomware, data breaches, and third-party vulnerabilities—can have devastating consequences on your company. With more Governments looking to increase regulations to ensure organisations secure 3rd and 4th party providers, o...
Is Continuous Threat Exposure Managemen...
In today's dynamic threat landscape, organizations, especially within the State, Local and Education sectors, face the challenge of enhancing their cybersecurity posture without overhauling existing systems.Gartner's Continuous Threat Exposure Management (CTEM) framework offers a strategic approach to continuously refine and optimize security measures.During this webinar, attendees learned:How to implement Gartner's CTEM framework without over...
How to Protect Assets in a Connected Wo...
Attendees were joined by Connor Rhodes, Enterprise Solutions Engineer at Verkada, on Thursday, March 27th, as he walked through:Cybersecurity principles for both on-prem and cloud-based systemsHow to safeguard risks that organizations face todayAnd so much more about Verkada's security solutions for state and local government organizations
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.