Back to Search Begin New Search Save Search Auto-Notify
Machine Identity Security Breakfast
Attendees joined Venafi, CyberArk & Carahsoft as we hosted a virtual event to learn about machine identity management challenges and solutions. The key takeaways attendees gained from this event:Expand Your Professional Network: Connect with peers and industry experts to exchange valuable insights and strategies for navigating current and future challenges in certificate lifecycle management.Future-Proof Your Cybersecurity: Dive into discu...
Add Favorite
iboss Beyond Web Filtering
Carahsoft, Howard and iboss had an exclusive webinar tailored to K-12 IT Directors where attendees learned how iboss' Zero Trust SASE platform is transforming cybersecurity in schools. Webinar Highlights:Real-world examples of how iboss is helping schools stay ahead of cybersecurity threatsInsights into the latest trends in K-12 education cybersecurityLive Q&A session with experts from Howard and iboss
Add Favorite
OMB, FISMA & CISA Zero Trust Data Compl...
During this webinar, attendees learned how combining Zero Trust principles of XQ with AWS infrastructure enables agencies to streamline FISMA audits and stay ahead of CISA directives, enhance data governance and ensure compliance with federal frameworks and protect sensitive data by using encryption, geofencing and external key management.
Add Favorite
NIST NCCoE Practice Guide: Implementing...
F5 hosted an exclusive webinar on implementing Zero Trust architectures, featuring a special guest speaker from NIST. F5 provided an overview of how its technologies apply to Zero Trust Architecture, including where F5 BIG-IP fits within this NCCoE practice guide implementation. During this webinar, attendees:Explore the NIST National Cybersecurity Center of Excellence (NCCoE) and its critical work in developing real-world implementation guide...
Add Favorite
Do You Trust Me? The Basis of ZTA Archi...
In this webinar experts from Commvault and ATP Gov explored integrating security into every aspect of the information architecture, aligning with NIST’s Cybersecurity Framework. Despite the extended deadline to 2027, agencies must leverage AI, automation, and advanced strategies to fortify their zero-trust frameworks. Further, they discussed the concept of cyber resilience and its crucial relationship to ZTA, ensuring a comprehensive and...
Add Favorite
Strengthening DoD Cyber Resilience
In the rapidly evolving threat landscape, the Department of Defense faced unprecedented challenges in maintaining robust cybersecurity across its vast digital infrastructure. This workshop brought together two leading solutions in cyber defense, Armis and AttackIQ, to offer a comprehensive approach to strengthening your organization's security posture. Armis Overview Discovering and managing an accurate, unified and continuous asset inventory...
Add Favorite
Achieving Zero Trust Data Security with...
As cyber threats continue to evolve, federal agencies must adopt a Zero Trust approach to data security. View Trellix's exclusive webinar where we explored how our Data Security solutions help strengthen security posture, ensure compliance and protect mission-critical data from insider threats and external attacks. What Attendees Learned:The fundamentals of Zero Trust Data Security and why it’s critical for modern organizationStrategies...
Add Favorite
F5 API Security & Observability Workshop
Attendees joined Peter Scheffler, Sr. Solutions Architect at F5, and Jay Peņa, Solutions Engineer at F5, for a hands-on interactive workshop focused on API security and cybersecurity best practices. Hosted at the Cyber Bytes Foundation's Quantico Cyber Hub, this workshop provided participants with the opportunity to deepen their knowledge, uncover vulnerabilities, and develop actionable strategies to better protect their APIs. Attendees who jo...
Add Favorite
Getting Government Agencies to Secure P...
View this webinar from RSA & Carahsoft to gain valuable insights from a leading cybersecurity expert and learn how your agency can effectively implement passwordless authentication while meeting critical compliance requirements.
Add Favorite
Securing Classified Data from the Edge...
Sharing classified data securely across cloud, undersea cables, cellular, and space-based communications networks, remains a challenge for Mission Commanders and Intelligence Analysts. Their missions require the rapid amalgamation of diverse and disparate data sets for analysis and secure dissemination. This necessitates systems that are able to protect data in transit and at rest, from the edge to the operations center, anywhere in the world...
Add Favorite
Back to Search Begin New Search