Back to Search Begin New Search Save Search Auto-Notify
Showing results for cybersecurity
Search instead for cyber security
Enhance Cyber Resilience with Continuou...
Government agencies face increasing cyber threats in today's interconnected world. As digital infrastructure becomes critical to global operations, robust cybersecurity is more important than ever. By leveraging data-driven insights, agencies can proactively identify vulnerabilities, detect threats early and respond effectively to cyberattacks. During this webinar, attendees explored how to:Develop a data-driven approach to rapidly enhance cyb...
Add Favorite
Shielding Public Agencies: Proactively...
HCL Software hosted a webinar exploring how HCL AppScan helps public agencies stay ahead of cybersecurity threats. As cyberattacks grow more sophisticated, ensuring your applications are secure is more critical than ever.
Add Favorite
Operationalizing Zero Trust: NIST and B...
Over 15 years since its initial conception and more than three years since the U.S. federal government made it a fundamental tenet of its overall cybersecurity strategy, Zero Trust has only become more important as a strategic framework for government and critical infrastructure alike. While the imperative to implement Zero Trust has been well established, the question of “how” is less clear. Enter NIST and the National Cybersecuri...
Add Favorite
Use Cases in Threat Intelligence: Turni...
Attendees gained essential insights on modern cyber threats with experts from Google Public Sector and August Schell. The session explored the latest trends and emerging threats targeting U.S. Navy operations, aimed at strengthening cybersecurity and enhancing maritime security. Highlights included:A detailed overview of the current cyber threat intelligence and emerging trends targeting the U.S. public sector.Insights from Mandiant's latest t...
Add Favorite
PQC Migration: Where Are We Now?
Recent announcements from the likes of NIST, Gartner, and Google have highlighted the importance of post-quantum cryptography. These announcements have increased the sense of urgency for PQC migration. Given that PQC migration is a long-term and resource-intensive task, many are asking where the cryptography industry stands at this point. They want to know how they should be managing their PQC migrations, what kinds of tools they will need to...
Add Favorite
Next-Gen SOC at the Forefront
Recently, SOC Prime and Carahsoft hosted an exclusive webinar on the future of cybersecurity operations centers (SOCs). Participants discovered how next-gen SOCs empowered enterprise and MDR-focused organizations to stay ahead of evolving threats and minimize the risk of breaches by harnessing the power of cutting-edge technology, advanced automation, and community-driven threat intelligence.
Add Favorite
Agentforce: Transforming the United Sta...
Attendees joined this exclusive webinar where the Salesforce DoD team unveiled Agentforce, a groundbreaking AI-powered solution built on AWS cloud services. They discovered how this cutting-edge platform transformed operations across the United States Department of Defense by enhancing mission readiness, streamlining operations, and driving efficiency. An expert panel guided participants through Agentforce's advanced capabilities, showcasing h...
Add Favorite
Final Frontier of Endpoint Security: Tr...
Intel’s cybersecurity experts explored cutting-edge advancements in endpoint security. Attendees learned about the evolution of endpoint protection and the critical need for enhanced visibility and traceability below the operating system level. Experts shared insights and demonstrated how Intel’s trusted security platform provides unparalleled device visibility and control. The webinar covered how to:Enhance your organization...
Add Favorite
Protecting Salesforce Environments: Con...
This webinar focused on the pivotal role of a secure vaulted copy of Salesforce data. Kaitlin Carrollo, Senior Solution Specialist at Commvault and Stephen Pipino, CISSP, Distinguished Cybersecurity Architect at Salesforce, discussed how Commvault ensures that the data your users interact with and create in Salesforce every day is protected and recoverable, all within the only FedRAMP High Authorized backup solution on the market.
Add Favorite
Machine Identity Security Breakfast
Attendees joined Venafi, CyberArk & Carahsoft as we hosted a virtual event to learn about machine identity management challenges and solutions. The key takeaways attendees gained from this event:Expand Your Professional Network: Connect with peers and industry experts to exchange valuable insights and strategies for navigating current and future challenges in certificate lifecycle management.Future-Proof Your Cybersecurity: Dive into discu...
Add Favorite
Back to Search Begin New Search