DNS Security Data Exfiltration Workshop
View our on-demand recording enablement security workshop. In June 2020, the NSA Cybersecurity Director said that securing DNS can stop 92% of malware attacks on a network. Next-gen firewalls and endpoint tools have left behind DNS-based security blind spots. This workshop will walk system engineers through the conceptual abstracts of DNS security and bring a hands-on demonstration to enable attendees to test a network for DNS security gaps....
State & Local Security Thought Leadership
The cyber theft of private and confidential information from government agencies, business, and private individuals exceeded $6 trillion in 2021. The modern spy is responsible for these technologically advanced attacks targeting your data.Join VMware, WWT, and Carahsoft for an informative talk with Eric O'Neill, VMware's National Security Strategist. Hear him discuss real-life spy stories and a review of recent massive cyber-attacks to show ho...
State of Google: IT and Cybersecurity S...
Even within the rapidly evolving world of technology, the past two years have represented a whirlwind of change for Public Sector technology investment priorities. This on-demand webinar will help you understand what peers at agencies within the US public sector will be focused on in 2022. During this on-demand webinar, you will learn about: Real-time updates on US government fiscal 2022 budget changes (including Executive Order and Continuing...
Creating a Cybersecurity Professional D...
Cybersecurity is a diverse and technically complex profession. Security monitoring, intrusion detection, project management, education, and awareness are just a few skills vital to the modern cybersecurity team. Leaders are struggling to recruit and retain professionals with these critical skills in a market with dramatically increasing demand for talent. This poses a real threat to the continued operation of cybersecurity teams that require c...
ICAM Modernization: Honoring Your Legac...
Government agencies require a higher level of security and user experience than ever before. According to the Office of Management and Budget's updated policy around Identity, Credentials and Access Management (ICAM), agencies are being encouraged to use more flexible solutions, supporting pilots for new authenticators, and requiring the creation of a dedicated ICAM team.The answer? A multifaceted approach, involving access, security, governan...
Turn Your Endpoints Into Defendpoints
Everyone knows that cybersecurity must be a top focus for public sector agencies. The prevalence of attacks - only increasing over the last few years - has offered plenty of new insights into how different endpoints are being targeted. With the growing number of endpoints within agencies, opportunities to break through and compromise systems are extensive. Agencies must ensure that all of their endpoints are completely protected and immune to...
Creating a Cybersecurity Professional D...
Cybersecurity is a diverse and technically complex profession. Security monitoring, intrusion detection, project management, education, and awareness are just a few skills vital to the modern cybersecurity team. Leaders are struggling to recruit and retain professionals with these critical skills in a market with dramatically increasing demand for talent.This poses a real threat to the continued operation of cybersecurity teams that require ch...
Securing K-12 Modern Learning Environme...
Join Palo Alto Networks' for a 3-part on demand webcast series that will explore the challenges of cybersecurity in K-12 education and explore the resources that are available to help prevent successful attacks. The digital evolution of K-12 education, which has been underway for some time now, continues to surge as schools and districts move forward in their quest to deploy new tactics. These include 1:1, bridging the homework gap, and empowe...
Securing K-12 Modern Learning Environme...
Join Palo Alto Networks' for a 3-part on demand webcast series that will explore the challenges of cybersecurity in K-12 education and explore the resources that are available to help prevent successful attacks. The digital evolution of K-12 education, which has been underway for some time now, continues to surge as schools and districts move forward in their quest to deploy new tactics. These include 1:1, bridging the homework gap, and empowe...
Securing K-12 Modern Learning Environme...
Join Palo Alto Networks' for a 3-part on demand webcast series that will explore the challenges of cybersecurity in K-12 education and explore the resources that are available to help prevent successful attacks. The digital evolution of K-12 education, which has been underway for some time now, continues to surge as schools and districts move forward in their quest to deploy new tactics. These include 1:1, bridging the homework gap, and empowe...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.