Back to Search Begin New Search Save Search Auto-Notify
Showing results for cybersecurity
Search instead for cyber security
Eliminate Attack Pivoting with Network...
Consequence boundaries connect networks with dramatically different worst-case consequences of compromise – for example, IT networks connected to base microgrids, building automation or other OT networks. At consequence boundaries, we must eliminate the possibility of online attacks pivoting into our high-consequence networks – an emerging space of network engineering. Attendees joined Waterfall Security and Carahsoft to explore ho...
Add Favorite
Zero Trust: Reinforcing Cyber Resilienc...
In today’s cybersecurity landscape, maintaining trust boundaries is critical. This on-demand webinar dives into Zero Trust principles and architecture tailored for Federal health environments. Learn practical steps for adoption, discover solutions to common deployment hurdles, and explore how Zero Trust secures sensitive patient data while maintaining operational efficiency in military healthcare operations.Attendees learned:The core pri...
Add Favorite
Telemetry with AI: Modernizing IT for t...
The Department of Health & Human Services (DHHS) faces mounting pressure to modernize systems, strengthen cybersecurity and deliver effective and reliable public health services—all while ensuring compliance with Executive Order 14110 on safe, secure and trustworthy AI. On January 14th, Dynatrace & Red Hat experts demonstrated how AI-powered tools improve the DHHS' ability to provide safe, accessible and trustworthy public health...
Add Favorite
Cyber in the AI Era: Building Foundatio...
Federal security teams face mounting cyber threats, complex compliance frameworks, budget constraints and workforce reductions. As traditional approaches fail to scale, AI offers a path forward, but many teams don't know where to start. Attendees joined us online on January 21st for a strategic discussion on practical AI adoption for resource-constrained Federal teams. They heard from a cybersecurity and national security executive alongside a...
Add Favorite
Airlines and Airports: Visibility Acros...
Airports are some of the most complex and interconnected environments in the world — blending IT, OT, and IoT systems across everything from baggage handling and lighting, to fueling and passenger operations. As these systems become more connected, the risk of cyber disruption grows. A single OT outage can ground flights, disrupt services, and cost millions. Attendees joined us to explore how airports can achieve real-time visibility and...
Add Favorite
Government Contractor Challenges in 202...
Overview This FREE webinar will offer attendees an overview of the most significant regulatory, compliance, and operational updates affecting government contractors in 2026. Covering critical developments from DCAA audit expectations and Defense Department acquisition strategies to NDAA updates, cybersecurity requirements, and the latest changes to the FAR, DFARS, and Cost Accounting Standards, this session is designed to keep contractors info...
Add Favorite
Back to Search Begin New Search