Rising Threat & Safety Challenges on Ca...
During this Skopenow webinar, attendees discussed the rise of emerging threats and risks to safety on university and college campuses. This Q&A session, led by Skopenow’s Head of Public Sector, LC Cook, featured insights from four professionals working at some of the most well-known institutions across the US. The panel covered a variety of topics, including how to:Identify potential vulnerabilities in campus security systemsDetect a...
RSA Public Sector Day 2025
Snyk attended the RSA Public Sector Event this year!RSA Public Sector Day is an annual event held as part of the RSA Conference, focusing on cybersecurity challenges and solutions pertinent to government agencies. The event gathers government leaders, industry experts, and academia to discuss pressing cybersecurity issues, share best practices, and explore collaborative solutions to enhance the security posture of public sector organizations.
Data Exfiltration - An Existential Thre...
View this complimentary webinar from Carahsoft and BlackFog where we explored how organizations can prevent ransomware and data exfiltration, featuring BlackFog’s Anti Data Exfiltration (ADX) solution. Data exfiltration is a major threat to all organizations, but government agencies face heightened risks. In 2024, the sector was the second most targeted by ransomware, behind healthcare, with 94% of attacks involving data exfiltration. Cy...
Getting Cloudy: Achieve Cyber Resilienc...
Thank you for your interest in our Rubrik webinar:Getting Cloudy: Achieve Cyber Resilience in the Cloud with RubrikUnfortunately, this webinar is now over. We're sorry we missed you!Attendees of this webinar learned how agencies can leverage strategic cloud-native solutions to:Build a scalable cyber resiliency strategy in the cloudReduce complexityMinimize cyber recovery time objectives (RTO) while ensuring compliance with FedRAMP and StateRAMP
Pre-Payment Fraud Prevention for Government
The U.S. Government Accountability Office estimates that as much as $521 billion is lost to fraud annually. Fraudsters use advanced techniques, such as bots, stolen and synthetic identities, IP spoofing software, and the dark web to conceal fake applications, scale operations, and traffic stolen identities. Watch the on-demand recording to learn how Plum Identity can help you prevent fraud.Given this environment, governments should consider th...
Armis Federal SOF Week 2025 Executive B...
During this session, we took a deep look at the need to return to fundamental principles of military strategy to secure victory in the Cyber Defense environment. We dove into an exploration of what it means to truly “know ourselves” and “know our adversary” in the Cyber domain.During this executive briefing, attendees learned:What deep situational awareness looks like by exploring the concept of asset intelligence.About...
Trellix NDR: Minimize the Risk of Cyber...
Are you looking for more actionable visibility and control across a complex network environment? Trellix NDR does not leave any attack unseen. Watch this Trellix and Carahsoft webinar to see how we provide our government customers visibility and control across their network while improving incident investigation and response. Organizations work with Trellix because our advanced network detection and response (NDR) solution minimizes the risk o...
Cyber Resilience with Forward Networks:...
Want to stay ahead of cyber threats, gain insight from industry experts, and explore the latest technology in cybersecurity?Download our 5-part webinar series for expert insights on cyber risk management, threat detection, and security strategies.
Quantum Threats Are Coming - Is Your Da...
Bad actors breach networks for two reasons: 1. to disrupt (rarely) and 2. to steal valuable data for sale or ransom. With the rise of Quantum Computing and AI, threats like Ransomware, Harvest Now Decrypt Later, and evolving cyberattacks are growing concerns. At the same time, stricter regulations—such as CJIS 6.0—are enforcing stronger data protection requirements.A PQC data-centric security approach ensures that even if attackers...
How Deep Observability Improves Agency...
As agencies modernize their cybersecurity approach, aligning with Zero Trust (ZT) principles is no longer aspirational—it’s mission critical. But achieving a robust Zero Trust Architecture (ZTA) demands more than policy frameworks and access controls. It requires deep, continuous visibility into the network itself. This webinar explored how deep observability empowers agencies with actionable insights to meet Zero Trust compliance...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.