Back to Search Begin New Search Save Search Auto-Notify
Strengthening Cloud Operations: Minimiz...
Attendees joined Kelyn, Amazon Web Services (AWS) and Carahsoft for an engaging, interactive roundtable where industry leaders unpacked the limitations of native cloud tools, highlighted key risk factors, and shared proven strategies for building a robust, adaptable cyber resilience framework. Participants walked away with pragmatic, minimum-viable strategies to secure their environments without compromising agility or performance.
Add Favorite
Position Your FY26 Strategy for Federal...
Attendees gained actionable insights on:Which IT programs and initiatives are positioned for growth, and which face cutsHow to adapt your sales and capture strategies to align with agency prioritiesWhere emerging technologies like AI, cloud, and zero trust fit into the evolving landscapeWays to refine your messaging to resonate with federal buyersTactics to build a stronger pipeline focused on high-priority, well-funded programs
Add Favorite
Enabling Crypto-Agility for Your PQC Journey
During this session, attendees reviewed the progression of quantum computing along with industry recommendations to help agencies prepare for and transition to post quantum cryptography. Specific topics that were covered:Industry trends are helping agencies prepare for automating processes for encrypted assets.Practical recommendations for discovering and analyzing data for machine identities to better understand risks for PQC transitions.The...
Add Favorite
Proofpoint Core Email Protection API
Today’s biggest cyber threats don’t target systems—they target people. From phishing and account takeovers to misdirected emails and data loss, attackers increasingly exploit human behavior to breach defenses. In this webinar, our experts explored how our advanced solutions protect against the full spectrum of human-centric threats and save you time!Stop advanced email threats like phishing, malware, and business email compro...
Add Favorite
Reducing Your Cyber Exposure With Armis...
Attendees joined Armis experts as they explored how Armis Centrix™ embraces powerful collaboration with existing EDR, NAC and SIEM/SOAR. Attendees discovered how this synergistic CTEM approach transforms the security stack into a unified force delivering unparalleled asset intelligence and proactive threat mitigation to significantly reduce cyber exposure. During this complimentary webinar, attendees learned about:Unified Asset Intellige...
Add Favorite
F5 ADC 3.0: Revolutionizing Application...
F5, Red Hat, and Peraton hosted an interactive session highlighting how F5 ADC 3.0, F5 AI Gateway, and Red Hat technologies provide the tools you need to maintain resilience across an increasingly complex and expanding threat landscape.Attendees learned how our solutions can:Combat Emerging AI Threats: Discover the F5 AI Gateway, a cutting-edge solution providing real-time resilience against emerging cyber risks.Simplify and Automate Operation...
Add Favorite
Boosting Federal Efficiency: Work Smart...
Federal agencies increasingly turned to AI to streamline workflows, enhance productivity, and improve operations across departments, from procurement to cybersecurity. With real-world examples from agencies that had already put AI to work, this session highlighted how Microsoft Copilot helped modernize government processes. Participants joined this webinar to learn how their agencies could leverage Microsoft Copilot to boost efficiency and wor...
Add Favorite
Sovereign Cloud, Private Control Hypers...
What’s really happening with sovereign cloud and secure infrastructure in government? In this episode,Jason Blais, VP of Product & Program Management at Mattermost, breaks down the real trends shaping 2025 cloud adoption—without the buzzwords. He covers:The difference between commercial and sovereign hyperscalersInfrastructure trends agencies are watchingHow governments are really moving to the cloudThe geopolitical and operati...
Add Favorite
The Rising Threat: Defending Tribal Org...
Attendees learned:Understanding the Cyber Landscape and Common Cyber ThreatsStrategies for Mitigating Risk with Proactive Exposure ManagementBuilding Resilient Cyber TeamsAddressing Siloed Security as a Business Risk
Add Favorite
Identifying Hidden Cracks: Strengthenin...
Gartner presented the SOC Visibility Triad of capabilities (EDR, NDR and SIEM) as foundational capabilities for a SOC team to acquire to be as effective as possible; however, there are hidden assumptions baked into the SOC Visibility Triad that resulted in deployments being vulnerable and sitting on cracked foundations. Additionally, as technology has evolved, asset management solutions need to be capable of helping teams not only identify ass...
Add Favorite
Back to Search Begin New Search