Back to Search Begin New Search Save Search Auto-Notify
WIDS in the Public Sector for Today's Threats
As unmanaged wireless devices continue to pose significant risks to classified environments, selecting and deploying an effective Wireless Intrusion Detection System (WIDS) has become an important responsibility. Learn about the challenges military decision-makers face when evaluating and implementing WIDS solutions for today’s complex threat landscape. Join us to explore: A clear framework for evaluating WIDS capabilities aligned with D...
Add Favorite
One Screen, All Networks: A Simpler App...
From the warfighter on the edge to the policymaker in Washington, having clear, complete and timely information is imperative. Yet, today’s secure operations are often hindered by complexity, multiple workstations, siloed systems and outdated cross-domain workflows that drain resources, slow decisions and inflate costs. This webinar explores how government agencies can modernize their approach to classified and unclassified data access,...
Add Favorite
Powering the Next Generation of Mission...
Join us to explore how Nutanix transforms the way mission-critical applications and data are deployed—anywhere, with unmatched flexibility and performance. Whether you're navigating complex hybrid multi-cloud strategies, rethinking legacy infrastructure, or scaling experimentation across environments like NetModX, this session is your road map to what's next.
Add Favorite
Smart Strategies: Private 5G for DOD Us...
To secure future military advantage, the National Defense Strategy is designed to improve its digital environment and adopt the most promising technologies such as private 5G. Private 5G mobile network technology can help military installations accelerate innovation, optimize network services and modernize networks to meet mission and business needs. Join HPE Aruba Networking to learn: The key capabilities of private 5G and how it can be tailo...
Add Favorite
Cyber Protection and Access in Conteste...
CSOI Zero Trust Networking alignment redefines how secure access and protection are controlled over various communication channels across contested and diverse IT, OT and cloud environments. By shifting focus from securing the network perimeter and away from using end-user credentials as primary network authentication to policy-based access centered around cryptographic identities, CSOI delivers a powerful identity-based, non-kinetic advantage...
Add Favorite
Understanding the Critical Pathway to I...
Join Everfox and renowned behavioral scientist Dr. Eric Shaw for an exclusive session on the Critical Pathway to Insider Risk (CPIR) model—one of the most impactful behavioral science frameworks in insider risk management. Dr. Shaw is co-author of the seminal paper "Application of the Critical-Path Method to Evaluate Insider Risk" (Shaw & Sellers, 2015), Backed by The DOD Insider Threat Management and Analysis Center (DITMAC), the CP...
Add Favorite
Exploiting the Everyday: Adversaries' A...
As IT systems and online services rapidly evolve, the risks facing organizations have expanded significantly. This shift is reflected in a changing threat landscape, where adversaries increasingly exploit cloud platforms and SaaS applications as part of their campaign playbooks. In this webinar, we'll explore the wide range of services, applications and tools leveraged by threat actors to bypass traditional defenses, with a focus on the ...
Add Favorite
Ghosts in the Network: APTs, AI and the...
State-sponsored threat actors like those behind Volt Typhoon aren’t relying on zero-days or smash-and-grab exploits—they’re quietly infiltrating critical networks by exploiting public vulnerabilities, using stolen credentials and leveraging built-in system tools to stay undetected for months. These campaigns are designed to evade EDR, avoid raising alarms and exploit blind spots that traditional controls were never designed t...
Add Favorite
Securing Data-At-Rest from the Enterpri...
As adversaries grow more sophisticated and threats extend from the enterprise data center to the most austere tactical edge, securing data-at-rest has never been more critical. In this webinar, Dominic Perez, CTO of Curtiss-Wright Defense Solutions, and Tom Ricoy, Chief Product and Technology Officer at Cigent, will explore modern approaches to protecting sensitive information across the full mission lifecycle. We will examine how FIPS 140-3 s...
Add Favorite
Transforming Defense Cybersecurity: Ins...
This webinar brings together Bob Skinner, USAF retired former Director of the Defense Information Systems Agency (DISA) and Commander of the Joint Force Headquarters Department of Defense Information Network and Keith Johnson, Director of Defense Solutions at AWS. Together, they will discuss the Zscaler Trusted Access Gateway (ZTAG) and its role in revolutionizing cyber security within defense environments. Highlights will include how Zscaler...
Add Favorite
Back to Search Begin New Search