Back to Search Begin New Search Save Search Auto-Notify
Showing results for cybersecurity
Search instead for cyber security
Live Demo: How to Reduce Software Risk...
Cybersecurity isn’t just about firewalls and scans — it starts with writing secure code from the beginning. Watch Security Journey and Carahsoft's recent webinar, to learn how Security Journey can help teams reduce software vulnerabilities by training developers and engineers to think and act with security in mind.In this session, attendees learned how to:Equips developers with practical secure coding skillsAligns with federal cybe...
Add Favorite
Securing IT/OT Convergence: Lessons fro...
The convergence of IT and OT within the Department of Defense (DOD) and the federal government presents unique cybersecurity challenges, particularly in protecting critical infrastructure and industrial control systems. As highlighted in the latest CrowdStrike Global Threat Report, adversaries are increasingly targeting operational technology environments, exploiting vulnerabilities in industrial control systems and the Extended Internet of Th...
Add Favorite
Endpoint Security in Higher Education:...
Higher education institutions face an increasingly complex threat landscape, with endpoints—laptops, mobile devices, IoT, and research systems—being prime targets for cyberattacks. As IT professionals, securing these diverse endpoints while maintaining academic accessibility is a constant challenge.This webinar explored advanced endpoint security strategies, including Zero Trust architecture, Endpoint Detection and Response (EDR),...
Add Favorite
Automate and Improve Your Cyber Operati...
The Cyber Operational Readiness Assessment (CORA) program evaluates the cybersecurity posture and resiliency of each Authorization Boundary using a broad set of security, risk, and mission data. The problem for Defense and Intelligence Agencies is that they face limitations when trying to combine this data in meaningful, efficient ways that keep them continuously prepared for inspections.In our recent webinar, our Security and Risk Solution Co...
Add Favorite
Quantum Technologies and the Public Sec...
Quantum technologies are rapidly moving from research labs into real-world applications. For government and public sector IT leaders, gaining a clear understanding of quantum computing, quantum networks, and post-quantum security is essential for making informed strategic decisions. These developments are reshaping the future of data protection, communications and mission-critical systems across the federal enterprise.In this session, Bob Gour...
Add Favorite
A Government Framework for Proving Cybe...
Government cybersecurity investments are under greater scrutiny than ever. Agencies must secure mission-critical systems, meet complex compliance requirements and defend against escalating threats while justifying every dollar spent. Yet, traditional ROI models fall short when it comes to measuring the true value of risk reduction and prevention. Watch this webinar to learn more about Return on Mitigation (RoM), a novel framework designed to h...
Add Favorite
Zero Trust Best Practices for Federal A...
In today's rapidly evolving cybersecurity landscape, federal agencies face increasing pressure to implement Zero Trust Architecture (ZTA) to safeguard critical assets, streamline access controls, and meet stringent compliance requirements. The Cybersecurity and Infrastructure Security Agency (CISA) has outlined a clear roadmap through their Zero Trust Maturity Model (ZTM), enabling agencies to move from traditional security approaches to a mor...
Add Favorite
Fortinet Security Fabric: Fortifying Ne...
This webinar discussed the E-Rate eligible solutions of the Fortinet Security Fabric. Through a demonstration of available category 1 and category 2 E-rate eligible solutions, attendees learned how Fortinet can help their education organization achieve advanced, scalable cybersecurity for their schools.School IT departments face many challenges in keeping students, faculty and staff safe from cyber threats, like limited funding, while also mai...
Add Favorite
Quantum-Safe & Zero Trust: What Every F...
Federal agencies are racing to modernize cybersecurity infrastructure — not only to prepare for the quantum threat, but also to meet evolving Zero Trust mandates. Join Arqit, Intel & GAI for an exclusive panel discussion on how quantum-safe technologies are enabling federal organizations to build resilient, Zero Trust-aligned environments today. Moderated by Harvey Morrison, CEO and Co-Founder of Marion Square, this discussion highli...
Add Favorite
Live Demo: Navigating Networking in the...
We invite you to view our complimentary demo desk to learn more about the Fortinet Federal Secure Networking Stack. Experience a live demonstration of the FortiGate, FortiSwitch and FortiAP to see how Fortinet Federal can help with the Government's mission to do more with less. In the third demo of our series, we dived into how the Fortinet Federal Networking Stack can modernize your network, cut costs and strengthen cybersecurity with converg...
Add Favorite
Back to Search Begin New Search