Meeting Network Analysis & PCAP Requirements
Trellix Network Security won the NAVWAR Cybersecurity Challenge at identifying never-seen-before (“signature-less”) attacks by observing network activity. It also received the Gold Globe Cyber Security Global Excellence Award for Network Detection & Response (NDR).Think of “NDR” as a sibling to “Endpoint Detection & Response (EDR)” working together to detect threats and optimize the response to incid...
2025 Government Predictions: Cyber Mand...
With calendar 2024 coming to a close, it’s a natural time to reflect on the cybersecurity mandates, policies and strategies that have shaped the last few years in government. One of the most impactful strategies has been Zero Trust. As agencies continue to implement zero trust security controls to reduce the attack surface, addressing foundational challenges like data protection, legacy technology and organization collaboration will be k...
Enhancing Cybersecurity Operations with...
State and local governments face unique challenges in cybersecurity, from evolving threat landscapes to constrained resources and complex compliance requirements. Blackwire.ai, a purpose-built GenAI platform for cybersecurity, empowers government security teams to elevate their threat response capabilities, streamline compliance, and leverage expert-vetted insights without expanding headcount or buying expensive new systems. Thank you for join...
CTO Sessions: 2024 Data Threat Report -...
The 2024 Thales Data Threat Report highlights the unique security challenges faced by U.S. Federal agencies. This report reveals new cybersecurity strategies as well as key differences between federal and global survey responses, providing valuable insights to stay ahead in the evolving security landscape. Key Findings40% of USFED agencies and organizations report having experienced a ransomware attack47% of agencies reported breaches in 2021,...
iboss Unified Cybersecurity and Student...
Are you looking for unified cybersecurity? What about a student safety platform for your clients? If yes, then click to watch an exclusive partner-focused webinar and discover what iboss can offer you. In this webinar, attendees learned how to:The iboss Zero Trust SASE platform for Education is a tailored solution designed specifically for the needs of schools.To consolidate Web Filtering, Classroom Management, Student Mental Health Alerts, VP...
Enhance Cyber Resilience with Continuou...
Government agencies face increasing cyber threats in today's interconnected world. As digital infrastructure becomes critical to global operations, robust cybersecurity is more important than ever. By leveraging data-driven insights, agencies can proactively identify vulnerabilities, detect threats early and respond effectively to cyberattacks. During this webinar, attendees explored how to:Develop a data-driven approach to rapidly enhance cyb...
Shielding Public Agencies: Proactively...
HCL Software hosted a webinar exploring how HCL AppScan helps public agencies stay ahead of cybersecurity threats. As cyberattacks grow more sophisticated, ensuring your applications are secure is more critical than ever.
Operationalizing Zero Trust: NIST and B...
Over 15 years since its initial conception and more than three years since the U.S. federal government made it a fundamental tenet of its overall cybersecurity strategy, Zero Trust has only become more important as a strategic framework for government and critical infrastructure alike. While the imperative to implement Zero Trust has been well established, the question of “how” is less clear. Enter NIST and the National Cybersecuri...
Use Cases in Threat Intelligence: Turni...
Attendees gained essential insights on modern cyber threats with experts from Google Public Sector and August Schell. The session explored the latest trends and emerging threats targeting U.S. Navy operations, aimed at strengthening cybersecurity and enhancing maritime security. Highlights included:A detailed overview of the current cyber threat intelligence and emerging trends targeting the U.S. public sector.Insights from Mandiant's latest t...
PQC Migration: Where Are We Now?
Recent announcements from the likes of NIST, Gartner, and Google have highlighted the importance of post-quantum cryptography. These announcements have increased the sense of urgency for PQC migration. Given that PQC migration is a long-term and resource-intensive task, many are asking where the cryptography industry stands at this point. They want to know how they should be managing their PQC migrations, what kinds of tools they will need to...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.