Closing the Mobile Threat Blindspot: Wh...
Your SOC may have SIEM, SOAR, and EDR in place - but are you still blind to mobile threats? Attackers increasingly target employees through their smartphones with phishing, smishing, malicious apps, and social engineering tactics that traditional security tools miss. Without mobile threat intelligence, your organization is exposed to breaches that start at the human layer. In this webinar, attendees learned how to eliminate the blindspot and f...
Strengthening Federal Cybersecurity wit...
In response to Executive Order 14028, federal agencies are accelerating their adoption of Zero Trust architectures to modernize and secure their IT environments. A critical yet often overlooked component of this transformation is Encrypted DNS, a foundational element that enhances visibility, control and resilience across distributed networks. During this webinar, Infoblox’s Chief DNS Architect, Cricket Liu, and Cybersecurity Strategist,...
Synthetic Data for Overcoming Data Bott...
As enterprises adopt AI across sectors, many hit the same roadblock: access to usable data. Sharing restrictions, regulatory concerns, and incomplete datasets continue to stall model development and critical decision-making. Download this Rockfish Data webinar exploring how synthetic data can solve these challenges—enabling secure data collaboration, faster AI development, and safer testing at scale. During this webinar, attendees learne...
Secure by Design: Building Resilient Sy...
With global supply chain attacks escalating, nation-state threats targeting critical infrastructure and AI generating code faster than we can secure it, the real challenge isn't avoiding threats—it's building systems that can withstand them. GitLab hosted a webinar on October 2nd for Cybersecurity Awareness Month to tackle the security challenges that keep government CISOs awake at night. During this fireside chat with GitLab's CISO, Jos...
A Blueprint to Defeat Social Engineerin...
A new social engineering-led threat is targeting IT Help Desks, and new strategies are required to defend against it. Gangs like Scattered Spider are honing their techniques and tools to exploit weaknesses in your security process and target institutions like yours with ransomware and data theft. Visionary CISOs are implementing novel defenses to fight back.During this webinar, attendees learned:What is the new social engineering threat?Which...
Unified Approach for Continuous Threat...
State and local governments and educational institutions face a growing challenge: securing interconnected IT and OT systems from modern cyber threats. Traditional siloed defenses are no longer enough. This webinar pertained to cybersecurity leaders ready to move beyond fragmented strategies and embrace a cohesive ‘whole-of-state’ approach. Attendees explored how to build a unified cybersecurity framework that leverages shared reso...
ISC2 SECURE Washington, DC 2025 On-Demand
If you were unable to join us in person, now you can experience the highlights anywhere, anytime. Our ISC2 SECURE Washington, DC 2025 On-Demand curated bundle gives you instant access to leading voices, expert insights and actionable strategies that will help you navigate today’s evolving cyber landscape. Catch up on what you missed and earn up to 6.75 CPE credits.
Cybersecurity At The Frontlines: SLED C...
State, local, tribal and educational institutions operate at the intersection of high public impact and limited cybersecurity resources. Despite constrained budgets, talent shortages, and an expanding digital threat landscape, SLED CISOs are finding innovative ways to secure critical infrastructure, protect citizen data, and enable resilient services. In this SentinelOne and RNSC Technologies webinar, experienced CISOs shared how they’re...
Beyond Phishing-Resistance: Fast-Track...
Whether you're modernizing authentication across your agency or looking to comply with federal mandates, this on-demand webinar provided a roadmap to deploy secure, scalable, and phishing-resistant access for security sensitive organizations and federal agencies.
Smarter Cities, Smarter Devices: Proact...
In this critical discussion, we covered the five pillars of a comprehensive IoT/OT strategy, including:Inventory, Visibility, and VulnerabilityPrioritizing Risk on Every Connected DeviceThreat and ResponseDevice Configuration and Ongoing ManagementHow to Gain All Risk Mitigation Options in One Solution
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.