Back to Search Begin New Search Save Search Auto-Notify
Showing results for cybersecurity
Search instead for cyber security
Fortifying the Future: Protecting 3rd a...
As supply chains become increasingly digital and interconnected, cybersecurity risks from partners and suppliers are evolving at an alarming pace. Cyberattacks targeting 3rd and 4th party supply chain networks—ransomware, data breaches, and third-party vulnerabilities—can have devastating consequences on your company. With more Governments looking to increase regulations to ensure organisations secure 3rd and 4th party providers, o...
Add Favorite
F5 API Security & Observability Workshop
Attendees joined Peter Scheffler, Sr. Solutions Architect at F5, and Jay Peņa, Solutions Engineer at F5, for a hands-on interactive workshop focused on API security and cybersecurity best practices. Hosted at the Cyber Bytes Foundation's Quantico Cyber Hub, this workshop provided participants with the opportunity to deepen their knowledge, uncover vulnerabilities, and develop actionable strategies to better protect their APIs. Attendees who jo...
Add Favorite
Is Continuous Threat Exposure Managemen...
In today's dynamic threat landscape, organizations, especially within the State, Local and Education sectors, face the challenge of enhancing their cybersecurity posture without overhauling existing systems.Gartner's Continuous Threat Exposure Management (CTEM) framework offers a strategic approach to continuously refine and optimize security measures.During this webinar, attendees learned:How to implement Gartner's CTEM framework without over...
Add Favorite
Cyber Resilience at the Crossroads
Cyber threats against U.S. infrastructure and the defense industrial base (DIB) are increasing at an alarming rate. Attacks from nation-state actors are compromising supply chains, contractors, and small-to-medium businesses at unprecedented levels. The White House’s NSM-22 directive underscores the urgency of securing critical infrastructure—but many organizations remain vulnerable. Topics discussed during this event include:How n...
Add Favorite
Getting Government Agencies to Secure P...
View this webinar from RSA & Carahsoft to gain valuable insights from a leading cybersecurity expert and learn how your agency can effectively implement passwordless authentication while meeting critical compliance requirements.
Add Favorite
Engagement to Excellence: 5 Proven Ways...
Attendees of this webinar learned to explore how cybersecurity compliance training can overcome the frustrating challenges government managers often face. As mandatory training meets growing resistance from employees and managers, today’s security awareness programs must evolve beyond basic compliance to deliver measurable outcomes that strengthen organizational security. Drawing from his 10 years of experience in gamifying cyber securit...
Add Favorite
The Threat Landscape for Critical Infra...
Explore the evolving cybersecurity landscape for critical infrastructure with Forescout Research – Vedere Labs as we analyze the key trends of 2024 and their implications for 2025. Drawing from our comprehensive global threat roundup, this session delved into how cyberattacks targeting these industries have been changing. From geopolitical conflicts to emerging vulnerabilities and sophisticated cybercrime, we examined the data shaping th...
Add Favorite
Mastering Visibility, Detection And Res...
Cyber threats targeting K-12 institutions continue to evolve, yet limited resources make it challenging to stay ahead. Situational awareness and proactive defense strategies are critical to ensuring security investments are directed where they matter most. During this webinar, attendees learned:About how Network Detection and Response (NDR) can strengthen your cybersecurity postureHow to leverage tools like behavioral analytics, AI and machine...
Add Favorite
Driving Efficiency Through Integrated N...
Empowering your agency to drive transformative cybersecurity outcomes in a more cost-efficient manner will be paramount in the years ahead. By leveraging industry-leading cybersecurity solutions, from Palo Alto Networks, you can revolutionize IT security, streamline processes and drive efficiency—all while improving your security posture in the process. Cybersecurity platforms from Palo Alto Networks are a force multiplier for defenders...
Add Favorite
Bridging the Gap with Arctic Wolf's Aur...
As organizations continue to strengthen their security posture, one key challenge remains: bridging the gap between detecting threats and achieving meaningful security outcomes. In today’s threat landscape, cybercriminals have been constantly refining their tactics, making it essential for defenders to adopt proactive strategies that address both emerging risks and evolving attack methods. Threat actors have thrived on exploiting gaps in...
Add Favorite
Back to Search Begin New Search