Lessons Learned From 100K Pentests: Com...
This session provided cybersecurity professionals with actionable intelligence on how continuous offensive security principles can transform reactive security programs into proactive defense strategies. Attendees learned evidence-based approaches to combat these systemic issues, including how to validate the effectiveness of existing security investments, implement risk-based prioritization frameworks, and establish continuous validation cycle...
Securing the Future: PQC, Compliance ...
QuSecure and Carahsoft hosted a high-level webinar overviewing how they are helping Federal government agencies prepare for the future of cybersecurity with quantum-resilient solutions.Fill out the form to access the recording for Federal use cases and strategies to:Understand the latest advancements in PQC and securing federal systemsLearn how to achieve compliance with evolving cybersecurity mandatesExplore how PQC integrates with Zero Trust...
Cyber Protection and Access in Conteste...
CSOI Zero Trust Networking alignment redefines how secure access and protection are controlled over various communication channels across contested and diverse IT, OT and cloud environments. By shifting focus from securing the network perimeter and away from using end-user credentials as primary network authentication to policy-based access centered around cryptographic identities, CSOI delivers a powerful identity-based, non-kinetic advantage...
Securing the Future: AI-Powered Office...
Whether you're leading cybersecurity efforts, managing IT systems, or shaping compliance protocols, this webinar delivered practical strategies you can implement right away. This webinar covered: How to secure and retain multi-channel communications across devices.Using AI to detect and stop real-time communication threats.Meeting compliance requirements with flexible, user-friendly tools.
How to Operationalize Threat Intelligen...
Government agencies face mounting cybersecurity challenges—from siloed threat data to slow incident response times. Cyware and Carahsoft hosted an interactive session designed to address the real-world gaps in today’s security operations.This session was an audience-driven discussion focused on practical solutions for modern SecOps challenges. Attendees learned to unlock the full potential of their “Threat Feeds” SIEM a...
Ghosts in the Network: APTs, AI and the...
State-sponsored threat actors like those behind Volt Typhoon aren’t relying on zero-days or smash-and-grab exploits—they’re quietly infiltrating critical networks by exploiting public vulnerabilities, using stolen credentials and leveraging built-in system tools to stay undetected for months. These campaigns are designed to evade EDR, avoid raising alarms and exploit blind spots that traditional controls were never designed t...
Education Cyber Resilience: A 4-Part Se...
Attendees joined us for an exclusive webinar series where Cisco and Proficio will explore today’s top cyber threats in education and how your institution can prepare. From real-world ransomware case studies to practical resilience planning, we’ll highlight proven strategies to strengthen security in both K–12 and higher education. Attendees gained insight into:Current threat trends in education, including ransomware-as-a-serv...
Strengthening Federal Cybersecurity wit...
In response to Executive Order 14028, federal agencies are accelerating their adoption of Zero Trust architectures to modernize and secure their IT environments. A critical yet often overlooked component of this transformation is Encrypted DNS, a foundational element that enhances visibility, control and resilience across distributed networks. During this webinar, Infoblox’s Chief DNS Architect, Cricket Liu, and Cybersecurity Strategist,...
Secure by Design: Building Resilient Sy...
With global supply chain attacks escalating, nation-state threats targeting critical infrastructure and AI generating code faster than we can secure it, the real challenge isn't avoiding threats—it's building systems that can withstand them. GitLab hosted a webinar on October 2nd for Cybersecurity Awareness Month to tackle the security challenges that keep government CISOs awake at night. During this fireside chat with GitLab's CISO, Jos...
Synthetic Data for Overcoming Data Bott...
As enterprises adopt AI across sectors, many hit the same roadblock: access to usable data. Sharing restrictions, regulatory concerns, and incomplete datasets continue to stall model development and critical decision-making. Download this Rockfish Data webinar exploring how synthetic data can solve these challenges—enabling secure data collaboration, faster AI development, and safer testing at scale. During this webinar, attendees learne...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.