Back to Search Begin New Search Save Search Auto-Notify
Showing results for cybersecurity
Search instead for cyber security
Navigating CMMC Compliance: The Integra...
The recent notice of proposed rulemaking for the Cybersecurity Maturity Model Certification (CMMC) program made one thing for certain: the U.S. Department of Defense is serious about external service provider (ESP) security. Under the proposed regulation, U.S. defense contractors will need to pay close attention to their Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) who qualify as ESPs to ensure they also achi...
Add Favorite
Integrating SBOM and Vulnerability Resp...
The visibility that a Software Bill of Materials (SBOM) gives into the ingredients that make up software components is critical to understanding cybersecurity risks. But understanding is only part of the solution. Organizations need to be ready to act on vulnerabilities before they impact system security. Attendees joined ServiceNow to examine the synergies between ServiceNow's Vulnerability Response framework and the principles underpinning C...
Add Favorite
Tableau Enablement Series Part 5: Secur...
In today's data-driven landscape, ensuring the security of your analytics environment is paramount. Join our webinar to enhance your Tableau security expertise and explore how cybersecurity principles intersect with Tableau's features to ensure secure data access for your users. During this webinar, attendees learned how to: Step up their Tableau security game: Attendees learned how to leverage Tableau's built-in features to secure their analy...
Add Favorite
Webinar Recording: Cyber-securing Safet...
Safety is the top priority in almost all mines, and reliable, efficient physical operations are close seconds. Cybersecurity is essential to all these priorities, in a world where automation is remotely accessible and where many mines are the targets of threats from sophisticated ransomware criminals to nation states. In addition, the trend towards cloud computing and cloud-based predictive maintenance services complicates cybersecurity and ex...
Add Favorite
FortiGate and SD-WAN
Discover the power of FortiOS and how it is leveraged to create secure and efficient network architecture. Firewalls, the backbone of any network’s cybersecurity architecture, need to level-up in order to support the demands of the modern world. Especially as SD-WAN (Software-Defined Wide Area Networks) becomes more prevalent across the nation as networks expand to cover more edges, the need for tools that are both powerful and easy to u...
Add Favorite
Implementing Zero Trust Controls and Mo...
Cybersecurity compliance frameworks are curated with the most effective methodologies an organization can take to prevent cyberattacks and reduce the impact if one occurs. If passed in current form, NIST 800-171A Rev.3 final public draft will adopt substantial changes to existing compliance controls required by the Cybersecurity Maturity Model Certification (CMMC). All those within the Defense Industrial Base will be required to observe substa...
Add Favorite
Embracing A Data-Driven Approach To Cyb...
Understanding what devices exist in your environment is the foundation to security. Identify compliance gaps and risks for all IP connected assets regardless of if they are managed or unmanaged. Where are you today with your Asset Management mission? Allow Armis to provide you real-time visibility and control over every asset connected to your network. The overview of the platform focused on:Discovering and managing an accurate, unified and co...
Add Favorite
Generative AI: Uses and Abuses in Cyber...
As organizations around the globe grapple with the implications of Generative AI (GAI) in cybersecurity, we recognize the importance of understanding its true impact and potential vulnerabilities. With the rise of GAI in both legitimate and malicious contexts, it is crucial to discern between hype and reality. This webinar, hosted by Trend Micro and Carahsoft, explored the nuances of GAI, particularly focusing on its utilization by threat acto...
Add Favorite
Maximize Security Detection with CrowdS...
CrowdStrike | Mimecast State, Local and Education webinar was on June 11th. During this webinar, Omar Cordova, Senior Sales Engineer at Mimecast, and Josh Radlein, Solutions Architect at CrowdStrike discussed how you can help secure your customer’s environments from sophisticated, targeted threats.In the current cybersecurity climate, organizations need to protect themselves from the increasing volume and impact of ransomware, impersonat...
Add Favorite
Transforming State and Local Government...
RiskRecon & Carahsoft hosted an illuminating webinar that went beyond theory and equipped attendees with practical tools and knowledge to revolutionize third-party cyber risk management.
Add Favorite
Back to Search Begin New Search