F5 Distributed Cloud Webinar: F5 Federa...
Federal agencies face many challenges in the form of security-related mandates and moving applications to the cloud, such as FIPS and OMB M-21-31. As these requirements become reality, administrators addressing these technical hurdles increasingly find themselves augmenting cybersecurity and application delivery tools leading to tool sprawl. During this on-demand webinar, attendees learned how F5 can help address these requirements while prov...
CTO Sessions: Quantum Resistant Security
Quantum computing’s impact is likely to be large—the potential computational power could render today’s encryption algorithms obsolete. The White House’s National Security Memorandum on Promoting US Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems states that “America must start the lengthy process of updating our IT infrastructure today to protect against this quantum com...
Charting China's Climb as a Leading Glo...
Recorded Future and Carahsoft are excited to invite you to join us subsequent to WEST 2024 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Over the last five years, Chinese state-sponsored cyber operations have transformed, emerging as a more mature, stealthy, and coordinated threat than in previous years, exemplified by the exploitation of zero-day vulnerabilit...
How to Improve your Cybersecurity Readi...
With cyber threats increasing in volume and sophistication, effective privileged access management (PAM) is now crucial for educational institutes. Best-in-class centralized privilege management enables institutes to establish an agile framework for Zero Trust access today and tomorrow, regardless of operating system (OS) or domain. In this webinar, learn how Delinea can help you protect your privileged accounts. During this on-demand webinar,...
Protecting the 2024 Election: Be Prepar...
After the events of the past few years, security is in the forefront of election officials’ minds. The individual states are responsible for conducting elections, so the National Association of Counties (NACo) at its annual legislative conference just conducted a series of workshops and panels on the range of threats facing election workers and voters alike. While physical threats, intimidation and harassment are primary concerns, there...
Meeting the Quantum Deadline: Migrating...
According to OMB M-23-02, agencies are directed to submit a prioritized inventory of information systems and assets, excluding national security systems, that contain CRQC-vulnerable cryptographic systems to ONCD and the Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA). No later than 30 days after the submission of each annual inventory of cryptographic systems required under Section II of this memorandu...
Empowering Public Sector Cybersecurity:...
The Executive Order on improving the nation's cybersecurity (EO14028) outlines several standards and requirements that government must meet to foster a more secure cyberspace. With endpoint security and event logging unified on a single FedRAMP cloud platform, Elastic and MAD Security effectively address the cybersecurity challenges ready to help agencies meet and exceed EO requirements with an affordable infrastructure model that keeps all ag...
Strategic Guidance On Solving M-24-04
M-24-04 requires that federal agencies must have a clear understanding of the devices connected within their information systems to gauge cybersecurity risk to their missions and operations. However, with today’s heavily complex environments this action requires a level of expertise and precision that poses its own set of challenges. To that end, Asc3nd Technologies Group, the premier federal partner in IoT and OT security, invites you t...
Unlocking Healthcare IT Success: Solvin...
This webinar is a part of Carahsoft's HIMSS 2024 Webinar Series exploring how to create tomorrow's health. In this on-demand webinar, SolarWinds Healthcare and Database experts dove into: Critical challenges confronting healthcare organizations and strategies for addressing patient and media scrutiny Essential techniques for enhancing database and IT infrastructure management, including leveraging observability tools and eliminating tool spra...
Dragos WorldView Threat Intelligence: P...
In a rapidly evolving and dangerous cyber landscape, threat intel is essential to keep an organization secure. Detecting threats to Industrial Control/Operational Technology (ICS/OT) systems is difficult, which is why Dragos has organized the industry’s largest and most experienced team of ICS cybersecurity practitioners. During this webinar, attendees learned how Dragos WorldView Threat Intelligence arms organizations with in-depth visi...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.