Mastering AWS Security: Leveraging Pris...
Attendees of this on-demand webinar learned about: Current trends in SLED cybersecurity Key strategies for securing your network, whether on-premises or in the cloud Elevating your cloud cybersecurity with Prisma Cloud to meet the demands of today's dynamic environments
Understanding the Quantum Cybersecurity...
The quantum computing threat is a clear and imminent danger, having the potential to completely disrupt all secured data, information systems and infrastructure. As we enter the quantum computing era, adopting a post-quantum crypto-agile encryption posture should be one of the top priorities agencies adopt and employ to fortify their proactive stance in cybersecurity. During this webinar, attendees learned about quantum computing power and the...
Empowering the U.S. Department of Defen...
Today's military defense requires creative solutions to tackle evolving threats in the battlefield. Innovation is key to maintaining an advantage over adversaries with advancements in modernization.Red Hat and its partners deliver innovation, speed decisions and supporting consistent, resilient and flexible mission architectures by:Addressing today's challenges:Need for more modernized, data-driven, and AI-empowered militaryPolicy and strategy...
Digital Transformation: Adhere, Comply,...
Join a fireside chat with industry leaders providing insight and perspective on the Executive Order 14028 and the state of cybersecurity in the Federal government. Improving the Nation's Cybersecurity based on subsequent guidance from CISA, United States Digital Service, Federal Risk and Authorization Management Programs and the National Security Agency. During this on-demand webinar, attendees gained knowledge on: How a Cloud Native Applicati...
How to Leverage AI to Optimize Your SOC...
Security Operations Centers struggle to keep pace with modern cybersecurity threat requirements. The volume and speed of threats (IOCs and IOAs) are well beyond the processing capabilities of even experienced security analysts, and this constraint doesn’t factor in the cost of these systems, which are expensive to buy, integrate and maintain.In this webinar, Tracy Williams from Anomali discussed the application of innovative AI technolog...
Seal the Cracks: Strategic Supply Chain...
In this webinar Archer and Carahsoft addressed the escalating challenges posed by supply chain cybersecurity risks in government networks. This webinar dove into: Understanding common supply chain and third-party risks. Proactively addressing and mitigating supply chain attacks to bolster organizational defenses. Leveraging NIST 800-171 best practices to fortify software supply chains against vulnerabilities. Exploring NIST NCCoE supply chain...
NIST CSF 2.0 - A Playbook for Supply Ch...
Digital supply chains are complex and critical systems. In a rapidly evolving cyber landscape, supply chain security remains a top concern for organizations looking to solidify their protection strategies. Many organizations look to NIST for direction when setting their cybersecurity strategy. The new version of the Cybersecurity Framework (CSF 2.0) has recently been released and provides best practices to help navigate the evolving threat lan...
Navigating Cybersecurity in the Defense...
Attendees joined Quzara and Carahsoft on April 25, 2024 for a critical discussion on the evolving threat landscape, practical defense strategies, and the intricate web of regulatory compliance shaping the future of defense cybersecurity. Attendees experienced: Expert Insights: Attendees heard from a distinguished panel, including voices from Microsoft's Defense and Aerospace teams and the DOD DC3 Crime Center. Real-World Solutions: Attendees d...
Forescout Webinar: Building Cyber Resil...
The rising use of Industrial IoT devices in critical infrastructure networks increases risks by connecting OT and IT systems, making critical processes more vulnerable. Lack of visibility into OT networks hinders OT organizations from assessing breach impacts on IT networks, leading to costly shutdowns. Fortunately, eyeInspect is now free for anyone in the DOD through Comply-to-Connect (C2C). In this User group webinar hosted by Carahsoft wher...
Automated & Continuous Security Complia...
Are you struggling to keep up with ever increasing security compliance and regulatory requirements? Is your team tired of manually intensive and labor some work for keeping up compliance efforts? Unlock the potential of automated and continuous security compliance and risk management to fortify your organization's defenses. Attendees joined us to learn more about: Regulations and industry standards driving cybersecurity efforts in the public s...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.