Eliminate Attack Pivoting with Network...
Consequence boundaries connect networks with dramatically different worst-case consequences of compromise – for example, IT networks connected to base microgrids, building automation or other OT networks. At consequence boundaries, we must eliminate the possibility of online attacks pivoting into our high-consequence networks – an emerging space of network engineering. Attendees joined Waterfall Security and Carahsoft to explore ho...
Zero Trust: Reinforcing Cyber Resilienc...
In today’s cybersecurity landscape, maintaining trust boundaries is critical. This on-demand webinar dives into Zero Trust principles and architecture tailored for Federal health environments. Learn practical steps for adoption, discover solutions to common deployment hurdles, and explore how Zero Trust secures sensitive patient data while maintaining operational efficiency in military healthcare operations.Attendees learned:The core pri...
Telemetry with AI: Modernizing IT for t...
The Department of Health & Human Services (DHHS) faces mounting pressure to modernize systems, strengthen cybersecurity and deliver effective and reliable public health services—all while ensuring compliance with Executive Order 14110 on safe, secure and trustworthy AI. On January 14th, Dynatrace & Red Hat experts demonstrated how AI-powered tools improve the DHHS' ability to provide safe, accessible and trustworthy public health...
Cyber in the AI Era: Building Foundatio...
Federal security teams face mounting cyber threats, complex compliance frameworks, budget constraints and workforce reductions. As traditional approaches fail to scale, AI offers a path forward, but many teams don't know where to start. Attendees joined us online on January 21st for a strategic discussion on practical AI adoption for resource-constrained Federal teams. They heard from a cybersecurity and national security executive alongside a...
Airlines and Airports: Visibility Acros...
Airports are some of the most complex and interconnected environments in the world — blending IT, OT, and IoT systems across everything from baggage handling and lighting, to fueling and passenger operations. As these systems become more connected, the risk of cyber disruption grows. A single OT outage can ground flights, disrupt services, and cost millions. Attendees joined us to explore how airports can achieve real-time visibility and...
Government Contractor Challenges in 202...
Overview This FREE webinar will offer attendees an overview of the most significant regulatory, compliance, and operational updates affecting government contractors in 2026. Covering critical developments from DCAA audit expectations and Defense Department acquisition strategies to NDAA updates, cybersecurity requirements, and the latest changes to the FAR, DFARS, and Cost Accounting Standards, this session is designed to keep contractors info...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.