Back to Search Begin New Search Save Search Auto-Notify
CTEM In Action: Providing Compliance, S...
As our CTEM series concluded, this final session brought together the critical elements needed to operationalize a proactive exposure management program. Agencies and organizations managing cyber-physical systems—especially those with OT, IoT and on-prem infrastructure—had to move beyond visibility to actionable defense. Armis experts demonstrated how to implement the final stages of a CTEM framework: delivering early warning of th...
Add Favorite
The Nearest Neighbor Attack: How it wor...
Cyber threats are evolving—attackers no longer need to be physically close to breach your wireless network. The Nearest Neighbor Attack redefines proximity, allowing hackers to exploit dual-homed devices and neighboring networks to infiltrate your infrastructure.Attendees learned:What is the Nearest Neighbor Attack is and how does it work?What real-world incidents exposed this new risk?What the key defense strategies are to secure your o...
Add Favorite
Why Privilege Matters: Stopping Cyber T...
Cyber threats are evolving, and privileged access remains a top target for attackers. 80% of Windows breaches succeed due to excessive privileges, making it crucial for organizations to rethink their security strategies. Dave Gunther, Regional Sales Manager at CyberFOX, explored how businesses can strike the perfect balance between security and productivity with Zero Standing Privilege (ZSP) and Least Privilege Access. Attendees learned how mo...
Add Favorite
Accelerating Naval Advantage with Cloud & AI
Attendees of this executive forum gained further insights on key challenges and opportunities in cloud adoption for the Navy, real-world defense outcomes driven by AI/ML innovation, and faster procurement strategies and deployment through AWS Marketplace.
Add Favorite
Enabling Secure Multi-Domain Collaborat...
As operations grow more complex, the need for secure, real-time data sharing across multiple security domains has never been greater. Yet, with a growing suite of solutions on the market, choosing the right tech for your mission can be confusing. Join Owl Cyber Defense’s experts to understand your options–and requirements–when it comes to cross domain solutions (CDS). Learn how each of Owl authorized solutions address a uniqu...
Add Favorite
Ensuring Critical Control Systems Stay...
We invite you to view our complimentary webinar: Ensuring Critical Control Systems Stay Online: Protecting Our Public Infrastructure. Learn more about how you can protect your critical infrastructure from evolving cyberattacks. In this webinar, subject matter experts from Fortinet and Armis addressed the heightened awareness for safeguarding critical infrastructure against increasing cyberattacks, including Ransomware, Malware and DDoS attacks...
Add Favorite
AI-Powered Automation for Efficient RMF...
In this webinar, we covered:Why RMF Step 4 is one of the most time- and cost-intensive phasesHow to automate assessment of Nessus, SCAP, Splunk, and STIG scan dataA live demonstration of NavigateCyber Assess and its integration with eMASSReal-world savings in time, cost, and mission readiness
Add Favorite
Accelerating AI Adoption: Bridging Fede...
Join us for an engaging and informative session that bridges the gap between federal and defense AI applications, offering actionable strategies to accelerate AI adoption and leverage its full potential in defense operations. Our panel of experts will delve into the comparative analysis of AI adoption within the U.S. Federal Government and the Department of Defense (DOD). They'll also explore the strategic integration of AI technologies across...
Add Favorite
Beyond VPNs: Identity-First Zero Trust...
In this webinar, attendees:Understand the advantages of Identity-First Zero Trust connectivity over traditional VPNs, IPSec tunnels, SD-WANs, and conventional ZTNA—especially for Non-Human Identity (NHI) and ICAM use casesGain deep insight into Zero Trust principles, identity-centric network overlays, and Secure-by-Design architectureExperience the real-time deployment of Zero Trust Networks-as-a-Service using NetFoundryDiscover key ente...
Add Favorite
Automate and Improve Your Cyber Operati...
The Cyber Operational Readiness Assessment (CORA) program evaluates the cybersecurity posture and resiliency of each Authorization Boundary using a broad set of security, risk, and mission data. The problem for Defense and Intelligence Agencies is that they face limitations when trying to combine this data in meaningful, efficient ways that keep them continuously prepared for inspections.In our recent webinar, our Security and Risk Solution Co...
Add Favorite
Back to Search Begin New Search