Back to Search Begin New Search Save Search Auto-Notify
Accelerate Your Defense Against Modern...
Amid an advancing threat environment, it’s important to provide your clients with comprehensive security. Yet this is easier said than done when a skills shortage makes it hard to find and hire qualified defenders. In this webinar, we’ll look at the challenges IT providers face when up against an escalating SMB threat landscape. We’ll also explore how Blackpoint saves you time, money, and streamlines your operations, all the...
May 7, 2024
Organizer: Blackpoint
Location: Webcast
Add Favorite
Advanced Threat Protection for Governme...
In today’s hyperconnected world, where cyber threats evolve rapidly and cyber criminals operate with heightened speed and flexibility, staying ahead of these risks is paramount. Your security teams need to be equally agile and well-prepared. Join ATARC alongside government and industry experts for a comprehensive discussion on the latest threat vectors impacting agency infrastructures. Discover insights into how cloud-native security sol...
May 2, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Consolidation and Automation, Not Compl...
Security threats against organizations are constantly evolving, and the emergence of AI is redefining the threat landscape. The sheer number of available security tools can make it difficult for organizations to choose the right ones while ensuring interoperability. To address this challenge, it is increasingly important to prioritize investment and select security tools that work seamlessly to close coverage gaps and maximize visibility. Join...
May 2, 2024
Organizer: World Wide Technology
Location: Webcast
Add Favorite
Using the Tools at Hand to Get to Zero Trust
Federal agencies have been ordered to move toward zero trust architectures with alacrity, through Executive Order 14028 on improving cybersecurity and the Office of Management and Budget’s two memoranda, M-22-09 on meeting zero trust cybersecurity principles, and M-21-31 on improving investigative and remediation capabilities following cyber breaches. The Department of Homeland Security observed in its Zero Trust Implementation Strategy...
May 1, 2024
Organizer: Fedinsider
Location: Webcast
Add Favorite
Trellix TechInsight Quarterly: Product...
Endpoint security is undergoing a seismic shift to modern endpoint security, transforming from traditional EPP to endpoint detection and response (EDR) with an approach that provides a path to extended detection and response (XDR), network detection and response (NDR), and to deeper investigations and forensics at scale. Learn about this shift at the Trellix TechInsight Quarterly: Product Showcase on April 30 at 10am PT / 1pm ET / 5pm GMT. Joi...
April 30, 2024
Organizer: Trellix
Location: Webcast
Add Favorite
Building Responsible AI Workflows with...
Generative artificial intelligence (genAI) has arrived with the force of a tsunami across the federal government. In October, Executive Order 14110 on the safe, secure, and trustworthy development and use of AI established the broad outlines for how agencies should evaluate and implement their AI use cases. Now the Office of Management and Budget has issued a memorandum directing agencies to institute governance and risk management processes g...
April 30, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
SANS Baltimore Spring 2024: Keynote - S...
In the field of cybersecurity, we are failing to acknowledge that we have a big problem. Our job titles and job descriptions have the word security in it even though security isn’t our job. I have never met a security professional who claims that their organization will never be breached. Yet, we call ourselves security? When a breach does occur, it reflects poorly on us. Did it mean we did our jobs poorly that day? Let’s have the...
April 29, 2024
Organizer: SANS Institute
Location: Webcast
Add Favorite
Microsoft Discovery Hour: Future-proof...
Join us at Microsoft Discovery Hour: Future-proof Flexible Work with Modern Endpoints to learn how you can better meet the demands of flexible work by building and managing a modern computing environment. During this free event, you’ll learn from Microsoft experts how a more secure IT infrastructure supports worker productivity and efficiency for companies of any size. You’ll also learn how to take advantage of existing tools and t...
April 29, 2024
Organizer: Microsoft
Location: Webcast
Add Favorite
The Gartner Cybersecurity Outlook for M...
Midsize enterprise (MSE) IT leaders face significant security challenges when trying to deliver IT services with small IT teams and limited IT budgets. Across industries, MSE IT budgets average 4.9% of annual revenue, but only 5% of the IT budget is dedicated to security. The need to create a strong, mature security posture remains. Join this complimentary Gartner security and risk webinar as Gartner expert Paul Furtado explores the top trends...
April 29, 2024
Organizer: Gartner
Location: Webcast
Add Favorite
Top Practices To Enable Digital Enginee...
Despite their complexity, the assets and systems that support defense organizations are critical to national security. Because of this, a consistent understanding of digital engineering and its application is vital. Digital engineering is based on discipline, processes, collaboration and technologies that allow defense organizations and their partners to overcome and manage the complexities of assets and processes throughout their life cycles....
April 29, 2024
Organizer: Gartner
Location: Webcast
Add Favorite
Back to Search Begin New Search