Back to Search Begin New Search Save Search Auto-Notify
Showing results for cybersecurity
Search instead for cyber security
Resilience Unleased: The Case for Devel...
During this webinar, attendees got to meet Synack, the premier security testing platform that offers Penetration Testing as a Service (PTaas) on its FedRAMP Moderate Authorized Platform. Synack enables federal, state and local government customers to increase cyber resilience, allowing them to find their most critical vulnerabilities and track improvements over time. During our complementary Synack webinar, attendees learned about: The Case fo...
Add Favorite
Third Party Risk Management Handled Webinar
During this webinar, we discussed: What all the AI chatter really means - what's possible, what's not, and who should care Whether AI poses an existential cybersecurity threat and how to protect against it How to use today's AI effectively and responsibly - and how to plan for what's next Register to view this on-demand recording.
Add Favorite
Innovations in Cybersecurity Training f...
Cyber workforce development has never been more essential in the public sector space. With cyber threats on the rise, upskilling employees and filling security positions is critical. Per the National Cybersecurity Strategy, updated in 2023, workforce development training is a directive moving forward. During this webinar, attendees: Learned how OffSec’s proven methodology can help improve your security posture Explored new and innovative...
Add Favorite
Mastering AWS Security: Leveraging Pris...
Attendees of this on-demand webinar learned about: Current trends in SLED cybersecurity Key strategies for securing your network, whether on-premises or in the cloud Elevating your cloud cybersecurity with Prisma Cloud to meet the demands of today's dynamic environments
Add Favorite
The Path to Successful CMMC: Expert Ins...
This virtual discussion featured Matt Travis, CEO of The Cyber AB – the official accreditation body of CMMC – and an expert panel discussing the requirements of CMMC, unpacking the layers and levels of cybersecurity preparedness it demands, and bringing their real-world experience to the table. Invaluable insights into the strategic and tactical steps companies must undertake to navigate their compliance journey successfully were s...
Add Favorite
Briefing on the Rocks with OpenText
Attendees had a chance to connect and learn more about OpenText and OpenText Cybersecurity products and how to stay viligent against cyberattacks.
Add Favorite
Understanding the Quantum Cybersecurity...
The quantum computing threat is a clear and imminent danger, having the potential to completely disrupt all secured data, information systems and infrastructure. As we enter the quantum computing era, adopting a post-quantum crypto-agile encryption posture should be one of the top priorities agencies adopt and employ to fortify their proactive stance in cybersecurity. During this webinar, attendees learned about quantum computing power and the...
Add Favorite
Empowering the U.S. Department of Defen...
Today's military defense requires creative solutions to tackle evolving threats in the battlefield. Innovation is key to maintaining an advantage over adversaries with advancements in modernization.Red Hat and its partners deliver innovation, speed decisions and supporting consistent, resilient and flexible mission architectures by:Addressing today's challenges:Need for more modernized, data-driven, and AI-empowered militaryPolicy and strategy...
Add Favorite
Digital Transformation: Adhere, Comply,...
Join a fireside chat with industry leaders providing insight and perspective on the Executive Order 14028 and the state of cybersecurity in the Federal government. Improving the Nation's Cybersecurity based on subsequent guidance from CISA, United States Digital Service, Federal Risk and Authorization Management Programs and the National Security Agency. During this on-demand webinar, attendees gained knowledge on: How a Cloud Native Applicati...
Add Favorite
How to Leverage AI to Optimize Your SOC...
Security Operations Centers struggle to keep pace with modern cybersecurity threat requirements. The volume and speed of threats (IOCs and IOAs) are well beyond the processing capabilities of even experienced security analysts, and this constraint doesn’t factor in the cost of these systems, which are expensive to buy, integrate and maintain.In this webinar, Tracy Williams from Anomali discussed the application of innovative AI technolog...
Add Favorite
Back to Search Begin New Search