Back to Search Begin New Search Save Search Auto-Notify
Showing results for cybersecurity
Search instead for cyber security
F5 Distributed Cloud Webinar
Overloaded government agency IT teams face escalating cybersecurity concerns and tight budgets. To make matters worse, agencies are experiencing the challenges associated with increased operational complexity as they turn to multi-cloud networking. Unfortunately, many IT professionals in these evolving complex environments are left with more questions than answers. Who protects what? Who supports what? What if I don't have training for that en...
Add Favorite
Industry Profile: How a Fortune 1000 Ma...
Join us as we have an intimate discussion with Erik Wille, CISO for American Axle and Manufacturing. You will hear Erik talk about his corporate journey and hear his real-world practical advice on how he and his peers in manufacturing are evaluating their policies, procedures, people, and technology, as well as identifying gaps and risks, measuring and understanding the uncovered gaps, and prioritizing them. During this webinar you will learn:...
Add Favorite
Prioritizing Funding: New Efforts to Ke...
Recent cyber attacks have targeted everything from critical infrastructure companies to local government offices. It is clear this trend will only continue as adversaries and criminal organizations find ways to exploit network vulnerabilities. In response, new legislative momentum supports increased funding efforts as we are seeing with the Bipartisan Infrastructure Bill. This episode will explore the growing need to strengthen resilience of b...
Add Favorite
Threat Hunting Masterclass Session 3: L...
Join CybernetIQ and Carahsoft for their three part on-demand Threat Hunting Masterclass. In this on-demand webinar series, Joe Cummins, CEO, CybernetIQ discusses real-life examples of teams, tradecraft, and technologies that are changing the way we see the cybersecurity situation. Session Description Register How to Make Sense of the Who, Why, and What in the Wire Download session one to hear real-life examples of teams, tradecraft, and techno...
Add Favorite
Google Cloud Work Safer Webinar with Cr...
In this on-demand webinar, you will learn about: Adversaries targeting public sector organizations and how to prepare to stop them How Google Cloud and CrowdStrike's integrated solutions provide proactive automation for threat hunting with shared intelligence across endpoints and workloads for a defense-in-depth infrastructure New strategies to achieve the highest levels of visibility, simplicity, and control to build stronger cybersecurity de...
Add Favorite
The Digital Naval Enterpise: Accelerati...
Rapid technological advances by near-peer adversaries have accelerated the need to innovate traditional cybersecurity and network approaches. This need is intensified by the massive shift to distributed workforces and distributed data. Now more than ever, Sailors, Marines, and the Naval Enterprise need the ability to securely access data from any device, any network, and any location. View this on-demand webinar from Zscaler and KBR where you...
Add Favorite
AI, Machine Learning and Strengthening...
The federal government is dedicated to advancing U.S. leadership in the research, development and use of artificial intelligence (AI), to promote both national security and economic prosperity. Using AI to improve cybersecurity is a logical target for its implementation. It is especially important as the threat landscape continues to evolve. The World Economic Forum (WEF) reports that about 1.7 billion IoT devices have been installed to date i...
Add Favorite
From Buzzword to Brass Tacks: Resetting...
In 2021, President Joe Biden issued an executive order that mandated agencies to start planning for the migration to a Zero Trust Architecture (ZTA). Since then, hundreds of tech companies have jumped on the zero trust bandwagon. It is clear to us that the current zero trust conversation is not resonating with most organizations. For government entities and tactical units on a budget, some of the zero trust solutions being offered today are ei...
Add Favorite
Roadmap to Modernization: Lessons in Le...
To ensure government can continue its critical mission during unprecedented times, it’s clear that it must modernize legacy systems, accelerate cloud adoption, strengthen cybersecurity posture, automate processes, move services online and more. But how will agencies quickly and securely make these transitions, ensuring data remains protected and citizen-facing services continue being delivered? In this year-long series, Nextgov, Defense...
Add Favorite
CyberSmart TV: Opening the Door for Mod...
As part of the American Rescue Plan passed earlier last year, the Technology Modernization Fund received a major influx of funding to support cybersecurity efforts, most of which targeted zero trust architecture. How are leaders implementing zero trust as part of their larger cybersecurity strategy? Beyond the technical efforts, what kind of culture is necessary to support zero trust frameworks? This episode explores the impact that additional...
Add Favorite
Back to Search Begin New Search