Back to Search Begin New Search Save Search Auto-Notify
Data Protection: A Key Pillar in Your Z...
As the threat landscape becomes increasingly complex, it’s crucial for organizations to adopt a clear strategy for transitioning to Zero Trust models while prioritizing data protection. Join Trellix and Carahsoft for an exclusive webinar where we’ll delve into how our Data Security solutions can help you strengthen your security posture across dual environments (air-gapped and cloud), ensuring compliance with evolving regulations,...
Add Favorite
Driving Efficiency Through Integrated N...
Empowering your agency to drive transformative cybersecurity outcomes in a more cost-efficient manner will be paramount in the years ahead. By leveraging industry-leading cybersecurity solutions, from Palo Alto Networks, you can revolutionize IT security, streamline processes and drive efficiency—all while improving your security posture in the process. Cybersecurity platforms from Palo Alto Networks are a force multiplier for defenders...
Add Favorite
Identity Security for SLED: Strengtheni...
Stop identity risks before they escalate. On April 24th, Okta hosted a webinar where attendees discovered how Identity Security Posture Management (ISPM) helps state, local, and education (SLED) organizations proactively address identity-based risks. As cyber threats grow more sophisticated, traditional identity tools often fall short in detecting misconfigurations, enforcing policies, and reducing risk. During this session, participants explo...
Add Favorite
Strengthening Print Security for State...
Data breaches increasingly impact state and local government agencies, with unsecured print infrastructure creating significant risks to sensitive data and compliance. Vasion provides a trusted solution relied on by agencies nationwide to enhance print security, eliminate vulnerabilities, and protect critical information.Attendees joined us for a webinar on Wednesday, April 30th to learn all about:How Vasion Print helps state and local agencie...
Add Favorite
Paging Dr. Zero Trust: Securing Healthc...
Healthcare data is under siege. As attacks escalate in frequency and impact, ransomware and data breaches aren’t just IT issues; they’re business, operational and trust issues across the healthcare ecosystem. Patient safety, care delivery, member privacy and regulatory compliance are all on the line.View Trellix and Carahsoft's Paging Dr. Zero Trust: Securing Healthcare Data Before it Flatlines, a focused webinar built for leaders...
Add Favorite
Beyond Human Access: Securing the AI ...
SailPoint hosted a webinar that provided actionable strategies to address pain points, offering insights into how SailPoint's intelligent identity security platform empowers you to gain comprehensive visibility and control over your expanding identity landscape. SailPoint discussed how to implement Zero trust principals, and how automation can assist in the management of these non-human identities.During this webinar, attendees:Gain an underst...
Add Favorite
How Deep Observability Improves Agency...
As agencies modernize their cybersecurity approach, aligning with Zero Trust (ZT) principles is no longer aspirational—it’s mission critical. But achieving a robust Zero Trust Architecture (ZTA) demands more than policy frameworks and access controls. It requires deep, continuous visibility into the network itself. This webinar explored how deep observability empowers agencies with actionable insights to meet Zero Trust compliance...
Add Favorite
Cybersecurity Resilience for Public Wat...
Public water and wastewater systems are ideal targets for cybercriminals because they combine three ingredients: tight budgets, lax cybersecurity practices, and almost guaranteed publicity, even for small attacks. While agencies can’t control increasing hacktivism targeting their utilities, you can increase your resilience by implementing basic cyber hygiene practices that make you a less attractive target and limit the damage from a cyb...
Add Favorite
Strategies for Navigating the Future of...
This webinar explored the 3 key strategies that public sector organizations must adopt to secure their digital services and ensure positive, authentic citizen experiences in the face of evolving bot threats.In this session, thought leaders covered:Understanding the Threat: Explore how public sector organizations can effectively balance robust bot defense with the need to offer smooth, user-friendly interactions for citizens.Combating Bot Activ...
Add Favorite
Nashville Gemini Secure Workspace Roadshow
This workshop was designed to provide hands-on experience with Google Workspace, explore the possibilities of generative AI, and learn how Google Workspace can enhance your security posture.During this workshop, attendees learned to:Explore Google Workspace tools to boost productivity and collaboration.Learn how Gemini AI can assist in creating videos, creating podcasts based on grounded sources, and can assist in writing and creating material...
Add Favorite
Back to Search Begin New Search