Back to Search Begin New Search Save Search Auto-Notify
Showing results for cybersecurity
Search instead for cyber security
2023-2024 Annual SLED Cybersecurity Pro...
Attendees joined us to dive into cybersecurity trends in SLED, their implications, and opportunities for their organization. They heard from SLED IT leaders and experts to learn about approaches to the benefits and challenges of implementing a Whole of State cybersecurity program, strategies and best practices for retaining and developing cyber talent, different methodologies around how SLED leaders are budgeting for cyber insurance, and techn...
Add Favorite
Embracing A Data-Driven Approach To Cyb...
Understanding what devices exist in your environment is the foundation to security. Identify compliance gaps and risks for all IP connected assets regardless of if they are managed or unmanaged. Where are you today with your Asset Management mission? Allow Armis to provide you real-time visibility and control over every asset connected to your network. The overview of the platform focused on: Discovering and managing an accurate, unified and...
Add Favorite
The AI Revolution – Transforming Email...
As cyber threats become more frequent and sophisticated, the adoption of Artificial Intelligence (AI) is reshaping the landscape of email security. This webinar will delve into key aspects of the AI revolution and its pivotal role in protecting against highly sophisticated attacks. Attendees joined Mimecast and Carahsoft to learn: What AI is and What It's Not Benefits of Deploying AI in Cybersecurity Tools Challenges in AI-Powered Threat Detec...
Add Favorite
Future-Proofing Aerospace & Satellite C...
Amid a backdrop of escalating cyber threats within the aerospace & satellite (A&S) industry, and with federal agencies like the U.S. Space Force, NASA, and the Intelligence Community deepening ties within the supply chain, cybersecurity compliance has emerged as a linchpin for success. As the Space Force unveils its largest budget yet at $30 billion for FY24, the urgency for A&S vendors to align with federal cybersecurity standards...
Add Favorite
Future-Proofing Aerospace & Satellite C...
Amid a backdrop of escalating cyber threats within the aerospace & satellite (A&S) industry, and with federal agencies like the U.S. Space Force, NASA, and the Intelligence Community deepening ties within the supply chain, cybersecurity compliance has emerged as a linchpin for success. As the Space Force unveils its largest budget yet at $30 billion for FY24, the urgency for A&S vendors to align with federal cybersecurity standards...
Add Favorite
F5 Distributed Cloud Webinar: F5 Federa...
Federal agencies face many challenges in the form of security-related mandates and moving applications to the cloud, such as FIPS and OMB M-21-31. As these requirements become reality, administrators addressing these technical hurdles increasingly find themselves augmenting cybersecurity and application delivery tools leading to tool sprawl. During this on-demand webinar, attendees learned how F5 can help address these requirements while prov...
Add Favorite
CTO Sessions: Quantum Resistant Security
Quantum computing’s impact is likely to be large—the potential computational power could render today’s encryption algorithms obsolete. The White House’s National Security Memorandum on Promoting US Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems states that “America must start the lengthy process of updating our IT infrastructure today to protect against this quantum com...
Add Favorite
Charting China's Climb as a Leading Glo...
Recorded Future and Carahsoft are excited to invite you to join us subsequent to WEST 2024 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Over the last five years, Chinese state-sponsored cyber operations have transformed, emerging as a more mature, stealthy, and coordinated threat than in previous years, exemplified by the exploitation of zero-day vulnerabilit...
Add Favorite
How to Improve your Cybersecurity Readi...
With cyber threats increasing in volume and sophistication, effective privileged access management (PAM) is now crucial for educational institutes. Best-in-class centralized privilege management enables institutes to establish an agile framework for Zero Trust access today and tomorrow, regardless of operating system (OS) or domain. In this webinar, learn how Delinea can help you protect your privileged accounts. During this on-demand webinar,...
Add Favorite
Protecting the 2024 Election: Be Prepar...
After the events of the past few years, security is in the forefront of election officials’ minds. The individual states are responsible for conducting elections, so the National Association of Counties (NACo) at its annual legislative conference just conducted a series of workshops and panels on the range of threats facing election workers and voters alike. While physical threats, intimidation and harassment are primary concerns, there...
Add Favorite
Back to Search Begin New Search