Agentic AI workshop: Train your first c...
Think AI model training is only for data scientists? Think again. Join this free hands-on workshop where you'll train and fine-tune a real cybersecurity model — no advanced math or data science degree required. As a cybersecurity professional, you should be training AI models. Your expertise is exactly what's needed to build effective AI-powered defenses. In this 90-minute, interactive session, you’ll learn some of the same skills...
Beyond MDBR: Why SLED Organizations are...
MS-ISAC’s free Protective DNS (MDBR) ended on October 1. With funding discontinued, the need to act is urgent. But this moment presents more than just a replacement decision; it’s an opportunity to upgrade this critical layer of cyber defense. Infoblox Threat Defense is the mature, best-in-class alternative, trusted by Federal and SLED organizations to deliver proactive, intelligent and resilient DNS-layer security. It ensures comp...
Fortra's MFT Solution
What Attendees Learned:How to use ICAP with GoAnywhere to apply and enforce sensitivity labels created by Fortra’s Data Classification SuiteWays to monitor and block sensitive data from being sent to unauthorized destinationsHow integrated Clearswift content scanning detects and stops malware, viruses, and banned file types
Transforming Defense Cybersecurity: Ins...
This webinar brings together Bob Skinner, USAF retired former Director of the Defense Information Systems Agency (DISA) and Commander of the Joint Force Headquarters Department of Defense Information Network and Keith Johnson, Director of Defense Solutions at AWS. Together, they will discuss the Zscaler Trusted Access Gateway (ZTAG) and its role in revolutionizing cyber security within defense environments. Highlights will include how Zscaler...
Using Real-Time OSINT to Defend Against...
During this session, attendees:Learn how to aggregate, analyze, and act on open-source intelligence to detect threats earlier.Discover how to correlate cyber indicators with physical incidents for a unified risk picture.See real-world use cases of OSINT enhancing decision-making and operational readiness
CMMC Compliance On-Prem: Leveraging Pri...
Attendees joined us for a CMMC strategy session designed for agencies seeking to streamline their path to compliance. Our panel of cybersecurity and compliance experts shared real-world strategies, best practices, and actionable insights that helped participants achieve and maintain efficient and cost-effective compliance. The session highlighted how to transform compliance from a challenge into a competitive advantage. Attendees learned how t...
Bank of America and RADICL: Your CMMC Partner
Watch our webinar, Bank of America and RADICL: Your CMMC Partner, to learn everything you need to know about the Cybersecurity Maturity Model Certification (CMMC), effective from December 16, 2024. This essential framework includes 17 requirements for Federal Contract Information (FCI) and 110 for Controlled Unclassified Information (CUI). Why Attend? Compliance with CMMC is crucial for securing DoD contracts and protecting against threats and...
ThreatOps Challenge: Endpoint Workshop
Attendees took part in the ThreatOps Challenge, a capture the flag style webinar where they dove into a SentinelOne Singularity console filled with alerts, threats and hidden surprises. Each game zeroed in on a unique aspect of the platform, giving them hands-on experience across all its threat hunting capabilities. During this webinar, attendees learned:How to analyze data and leverage Purple AIHow to uncover cloud vulnerabilitiesHow seamless...
Cyber Threats Move Fast - Be Ready to M...
Cyber threats are evolving faster than ever, and organizations need agile, comprehensive strategies to stay ahead. From zero-day exploits to targeted ransomware, attackers move quickly and the stakes are high. To better understand how organizations are responding, Arctic Wolf examined real-world incident response cases, uncovering key insights into common challenges, response priorities and recovery strategies. Attendees: Explore how full-serv...
Synthetic Data in Cybersecurity: Overco...
Attendees of this webinar joined Rockfish Data, along with experts from Cympire and SRI, for a technical discussion on how synthetic data is enabling more secure and effective cyber defense.During the webinar, attendees learned how to: Protect Privacy: Provide access to sensitive network and cyber datasets without exposing classified or personal informationAccelerate Testing & Evaluation: Supply repeatable, regulation-compliant datasets to...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.