Back to Search Begin New Search Save Search Auto-Notify
Next Generation HSM: Modernize Security...
How much is your legacy Hardware Security Module (HSM) infrastructure holding you back? Legacy HSMs were not designed for the evolving demands of today’s federal IT environments. Burdened by manual operations, limited scalability, and outdated architectures, these systems are costly to maintain, unable to meet the requirements of Zero Trust, and difficult to integrate with modern federal IT strategies. Additionally, many legacy HSMs are...
Add Favorite
Securing and Optimizing the Unified Network
CDW/Sirius Federal, Dell, Versa, NetScout and Vcinity took a look into their unique approach at securing and optimizing the unified network. This session focused on DOD initiatives around zero-trust principles and a data-centric posture, aiming for a secure and resilient network within mission-critical environments around the world. We discussed the specific challenges faced during this process including: security vs speed, bandwidth and netwo...
Add Favorite
Beyond VPNs: Identity-First Zero Trust...
In this webinar, attendees:Understand the advantages of Identity-First Zero Trust connectivity over traditional VPNs, IPSec tunnels, SD-WANs, and conventional ZTNA—especially for Non-Human Identity (NHI) and ICAM use casesGain deep insight into Zero Trust principles, identity-centric network overlays, and Secure-by-Design architectureExperience the real-time deployment of Zero Trust Networks-as-a-Service using NetFoundryDiscover key ente...
Add Favorite
Google Workspace & Dito Hartford Roadshow
This workshop was designed to provide hands-on experience with Google Workspace, explore the possibilities of generative AI, and learn how Google Workspace can enhance your security posture.During this workshop, attendees learned to:Explore Google Workspace tools to boost productivity and collaboration.Learn how Gemini AI can assist in creating videos, creating podcasts based on grounded sources, and can assist in writing and creating material...
Add Favorite
Defense Ops Debates: Breach Lessons
3 Breaches. 1 Pattern Discord 2023. Signal 2024. Treasury 2024. Three leaks, three different attack paths, and one common blind spot: unsecured mission comms. Picture the next morning's brief: classified slides splashed across social media, an ops channel scraped, and the wrong key in the wrong hands. Now, the timeline moves fast: press, hearings, budget freezes. At 11 AM ET on June 26, a 30-year Navy SEAL and a retired USAF intel chief go fro...
Add Favorite
Secure Access to Generative AI Tools in...
Generative AI tools like ChatGPT have transformed how government organizations access information and enhance productivity. However, their adoption raises critical concerns about safeguarding sensitive data and maintaining compliance. During this insightful webinar, Zscaler demonstrated how to provide your users with access to generative AI tools while ensuring robust data security measures utilizing a Zero Trust framework. From browser isolat...
Add Favorite
Fortify Security and Compliance With Se...
Tackling security and compliance risks is an enabler to successful cloud adoption. In this session, we explored how public sector organizations can incorporate ServiceNow Vault into their overall security and compliance posture to bolster advanced data security and privacy controls. The session was designed for the CISO—and those who support the CISO—covering key topics such as platform encryption, zero trust, data privacy, and mal...
Add Favorite
Mission Efficiency with a Powerful Alte...
Thank you for your interest in our mission-focused webinar on modernizing threat analysis—without compromising security or performance.During the webinar, attendees learned how ReversingLabs delivers deep visibility, scalable automation and cost-efficient performance—eliminating the typical trade-offs between speed, scale and data control. The session covered how to simplify threat analysis workflows, support mission growth and max...
Add Favorite
Unifying the Tactical Edge
With the end of the fiscal year rapidly approaching, the critical need to align your budget with evolving DoD mandates is crucial. Directives like the DoD Zero Trust Strategy are not just guidelines; they are fundamental shifts in how we modernize and support the warfighter. Failure to adapt can leave you exposed to evolving cyber threats.This isn't a moment for short term solutions, it's time for a unified approach to secure your most challen...
Add Favorite
Zero Trust Best Practices for Federal A...
In today's rapidly evolving cybersecurity landscape, federal agencies face increasing pressure to implement Zero Trust Architecture (ZTA) to safeguard critical assets, streamline access controls, and meet stringent compliance requirements. The Cybersecurity and Infrastructure Security Agency (CISA) has outlined a clear roadmap through their Zero Trust Maturity Model (ZTM), enabling agencies to move from traditional security approaches to a mor...
Add Favorite
Back to Search Begin New Search