Back to Search Begin New Search Save Search Auto-Notify
Cyber Resilience at the Crossroads
Cyber threats against U.S. infrastructure and the defense industrial base (DIB) are increasing at an alarming rate. Attacks from nation-state actors are compromising supply chains, contractors, and small-to-medium businesses at unprecedented levels. The White House’s NSM-22 directive underscores the urgency of securing critical infrastructure—but many organizations remain vulnerable. Topics discussed during this event include:How n...
Add Favorite
CTO Sessions: Intersection of AI and Security
Artificial intelligence (AI) is rapidly transforming our world, from the way we work to the way we interact with machines. But, with this immense power comes immense responsibility. As AI becomes more sophisticated, so too do the security risks. This CTO Session focused on the critical issues at the intersection of AI and security. Our speaker, Gina Scinta, explored:Countering malicious use of AI systems by actors with ill intentions, such as...
Add Favorite
Sparking SIEM Evolution: The Google Advantage
In this webinar, attendees learned how SIEM's complicated evolution has resulted in unsustainable cost increases, scope creep, and the occasional declaration that the product space is dying. Thanks to deep expertise in search and data management, access to OSINT and frontline intelligence, and AI-infused features, Google SecOps demonstrated that the SIEM is not dying but evolving and still has plenty of gas in the tank.Attendees learned about:...
Add Favorite
Engagement to Excellence: 5 Proven Ways...
Attendees of this webinar learned to explore how cybersecurity compliance training can overcome the frustrating challenges government managers often face. As mandatory training meets growing resistance from employees and managers, today’s security awareness programs must evolve beyond basic compliance to deliver measurable outcomes that strengthen organizational security. Drawing from his 10 years of experience in gamifying cyber securit...
Add Favorite
Getting Government Agencies to Secure P...
View this webinar from RSA & Carahsoft to gain valuable insights from a leading cybersecurity expert and learn how your agency can effectively implement passwordless authentication while meeting critical compliance requirements.
Add Favorite
The Threat Landscape for Critical Infra...
Explore the evolving cybersecurity landscape for critical infrastructure with Forescout Research – Vedere Labs as we analyze the key trends of 2024 and their implications for 2025. Drawing from our comprehensive global threat roundup, this session delved into how cyberattacks targeting these industries have been changing. From geopolitical conflicts to emerging vulnerabilities and sophisticated cybercrime, we examined the data shaping th...
Add Favorite
Mastering Visibility, Detection And Res...
Cyber threats targeting K-12 institutions continue to evolve, yet limited resources make it challenging to stay ahead. Situational awareness and proactive defense strategies are critical to ensuring security investments are directed where they matter most. During this webinar, attendees learned:About how Network Detection and Response (NDR) can strengthen your cybersecurity postureHow to leverage tools like behavioral analytics, AI and machine...
Add Favorite
Driving Efficiency Through Integrated N...
Empowering your agency to drive transformative cybersecurity outcomes in a more cost-efficient manner will be paramount in the years ahead. By leveraging industry-leading cybersecurity solutions, from Palo Alto Networks, you can revolutionize IT security, streamline processes and drive efficiency—all while improving your security posture in the process. Cybersecurity platforms from Palo Alto Networks are a force multiplier for defenders...
Add Favorite
Bridging the Gap with Arctic Wolf's Aur...
As organizations continue to strengthen their security posture, one key challenge remains: bridging the gap between detecting threats and achieving meaningful security outcomes. In today’s threat landscape, cybercriminals have been constantly refining their tactics, making it essential for defenders to adopt proactive strategies that address both emerging risks and evolving attack methods. Threat actors have thrived on exploiting gaps in...
Add Favorite
Modernizing Cybersecurity with VMware C...
During this webcast attendees learned about how vDefend can:Provide visibility and security intelligenceAdd firewall policies and advanced threat prevention with no underlying physical networking changesAddress many of the NIST Cyber Security Framework areas
Add Favorite
Back to Search Begin New Search