Understanding the Critical Pathway to I...
Join Everfox and renowned behavioral scientist Dr. Eric Shaw for an exclusive session on the Critical Pathway to Insider Risk (CPIR) model—one of the most impactful behavioral science frameworks in insider risk management. Dr. Shaw is co-author of the seminal paper "Application of the Critical-Path Method to Evaluate Insider Risk" (Shaw & Sellers, 2015), Backed by The DOD Insider Threat Management and Analysis Center (DITMAC), the CP...
Discover How Utilities Are Solving Real...
Download the webinar to learn how leading electric, gas and water utilities are using artificial intelligence and modern analytics to solve operational challenges, boost performance and deliver better service. Backed by over 20 years of industry experience, our experts will walk you through real-world success stories and actionable strategies for transforming raw data into predictive insights.During the webinar, attendees learned how to:Tackle...
AI-Powered OSINT to Unify Intelligence...
In this webinar, we demonstrated a scalable, repeatable methodology for leveraging Large Language Models (LLMs) to extract intelligence from social media during civil unrest and politically sensitive events. Through a live demo, we walked through our OSINT workflow—from planning and collection to knowledge extraction and dissemination—showing how it could be applied across defense, public-health and enterprise missions to detect na...
Closing the Mobile Threat Blindspot: Wh...
Your SOC may have SIEM, SOAR, and EDR in place - but are you still blind to mobile threats? Attackers increasingly target employees through their smartphones with phishing, smishing, malicious apps, and social engineering tactics that traditional security tools miss. Without mobile threat intelligence, your organization is exposed to breaches that start at the human layer. In this webinar, attendees learned how to eliminate the blindspot and f...
Unified Approach for Continuous Threat...
State and local governments and educational institutions face a growing challenge: securing interconnected IT and OT systems from modern cyber threats. Traditional siloed defenses are no longer enough. This webinar pertained to cybersecurity leaders ready to move beyond fragmented strategies and embrace a cohesive ‘whole-of-state’ approach. Attendees explored how to build a unified cybersecurity framework that leverages shared reso...
Maximize Every Tax Dollar with AI and C...
Public Sector organizations across the U.S. are embracing Artificial Intelligence (AI) and cloud innovations to stretch taxpayer dollars for better serving citizens. By adopting smart cloud optimization solutions and tools enabled with AI and automation, government agencies can streamline operations, cut unnecessary costs, and ensure resources are used efficiently. AI combined with Machine Learning provides foundational capabilities to proacti...
AI & Automation in Action: Modernizing...
Artificial intelligence (AI)-enabled software automation significantly enhances the operations and management of critical systems essential to national security, law enforcement and data analysis within the Department of Homeland Security (DHS) and the Department of Justice (DOJ). Red Hat OpenShift AI and Red Hat Device Edge, combined with Dynatrace’s observability tools, provide robust solutions for and drive automation within these sys...
DNS Under Siege: Unmasking the Infrastr...
In today’s threat landscape, DNS is no longer just the phonebook of the internet. It’s a battleground. Threat actors are exploiting DNS with unprecedented speed and sophistication, leveraging ephemeral domains, traffic distribution systems (TDS), domain hijacking and adversarial AI to evade detection and scale attacks. Attendees of this webinar learned about:The rise of one-time-use domains and their role in control evasionHow mali...
Strengthening Your Security Across Your...
Gigamon and Carahsoft hosted a demo desk, where we showcased how Gigamon empowers organizations to boost efficiency and strengthen security across physical and cloud environments. In this session, attendees discovered how powerful features like application intelligence can give them deeper visibility into their network and improve operational outcomes. During this complimentary demo, attendees learned:How to increase the security of all their...
Securing Tomorrow: The Critical Role of...
As adversaries increasingly exploit gaps in U.S. supply chains through covert capital, shell companies, and hidden ownership, vendor vetting has become a frontline defense—not just a compliance checkbox. Download this dynamic panel-style webinar featuring leading experts from Babel Street, Google Public Sector, and Minella Global Strategies to explore the evolving threat landscape and the urgent need for intelligence-driven vendor vettin...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.