Back to Search Begin New Search Save Search Auto-Notify
Showing results for cybersecurity
Search instead for cyber security
Mastering AWS Security: Leveraging Pris...
Attendees of this on-demand webinar learned about: Current trends in SLED cybersecurity Key strategies for securing your network, whether on-premises or in the cloud Elevating your cloud cybersecurity with Prisma Cloud to meet the demands of today's dynamic environments
Add Favorite
Understanding the Quantum Cybersecurity...
The quantum computing threat is a clear and imminent danger, having the potential to completely disrupt all secured data, information systems and infrastructure. As we enter the quantum computing era, adopting a post-quantum crypto-agile encryption posture should be one of the top priorities agencies adopt and employ to fortify their proactive stance in cybersecurity. During this webinar, attendees learned about quantum computing power and the...
Add Favorite
Empowering the U.S. Department of Defen...
Today's military defense requires creative solutions to tackle evolving threats in the battlefield. Innovation is key to maintaining an advantage over adversaries with advancements in modernization.Red Hat and its partners deliver innovation, speed decisions and supporting consistent, resilient and flexible mission architectures by:Addressing today's challenges:Need for more modernized, data-driven, and AI-empowered militaryPolicy and strategy...
Add Favorite
Digital Transformation: Adhere, Comply,...
Join a fireside chat with industry leaders providing insight and perspective on the Executive Order 14028 and the state of cybersecurity in the Federal government. Improving the Nation's Cybersecurity based on subsequent guidance from CISA, United States Digital Service, Federal Risk and Authorization Management Programs and the National Security Agency. During this on-demand webinar, attendees gained knowledge on: How a Cloud Native Applicati...
Add Favorite
How to Leverage AI to Optimize Your SOC...
Security Operations Centers struggle to keep pace with modern cybersecurity threat requirements. The volume and speed of threats (IOCs and IOAs) are well beyond the processing capabilities of even experienced security analysts, and this constraint doesn’t factor in the cost of these systems, which are expensive to buy, integrate and maintain.In this webinar, Tracy Williams from Anomali discussed the application of innovative AI technolog...
Add Favorite
Seal the Cracks: Strategic Supply Chain...
In this webinar Archer and Carahsoft addressed the escalating challenges posed by supply chain cybersecurity risks in government networks. This webinar dove into: Understanding common supply chain and third-party risks. Proactively addressing and mitigating supply chain attacks to bolster organizational defenses. Leveraging NIST 800-171 best practices to fortify software supply chains against vulnerabilities. Exploring NIST NCCoE supply chain...
Add Favorite
NIST CSF 2.0 - A Playbook for Supply Ch...
Digital supply chains are complex and critical systems. In a rapidly evolving cyber landscape, supply chain security remains a top concern for organizations looking to solidify their protection strategies. Many organizations look to NIST for direction when setting their cybersecurity strategy. The new version of the Cybersecurity Framework (CSF 2.0) has recently been released and provides best practices to help navigate the evolving threat lan...
Add Favorite
Navigating Cybersecurity in the Defense...
Attendees joined Quzara and Carahsoft on April 25, 2024 for a critical discussion on the evolving threat landscape, practical defense strategies, and the intricate web of regulatory compliance shaping the future of defense cybersecurity. Attendees experienced: Expert Insights: Attendees heard from a distinguished panel, including voices from Microsoft's Defense and Aerospace teams and the DOD DC3 Crime Center. Real-World Solutions: Attendees d...
Add Favorite
Forescout Webinar: Building Cyber Resil...
The rising use of Industrial IoT devices in critical infrastructure networks increases risks by connecting OT and IT systems, making critical processes more vulnerable. Lack of visibility into OT networks hinders OT organizations from assessing breach impacts on IT networks, leading to costly shutdowns. Fortunately, eyeInspect is now free for anyone in the DOD through Comply-to-Connect (C2C). In this User group webinar hosted by Carahsoft wher...
Add Favorite
Automated & Continuous Security Complia...
Are you struggling to keep up with ever increasing security compliance and regulatory requirements? Is your team tired of manually intensive and labor some work for keeping up compliance efforts? Unlock the potential of automated and continuous security compliance and risk management to fortify your organization's defenses. Attendees joined us to learn more about: Regulations and industry standards driving cybersecurity efforts in the public s...
Add Favorite
Back to Search Begin New Search