Back to Search Begin New Search Save Search Auto-Notify
Showing results for cybersecurity
Search instead for cyber security
Ghosts in the Network: APTs, AI and the...
State-sponsored threat actors like those behind Volt Typhoon aren’t relying on zero-days or smash-and-grab exploits—they’re quietly infiltrating critical networks by exploiting public vulnerabilities, using stolen credentials and leveraging built-in system tools to stay undetected for months. These campaigns are designed to evade EDR, avoid raising alarms and exploit blind spots that traditional controls were never designed t...
Add Favorite
Education Cyber Resilience: A 4-Part Se...
Attendees joined us for an exclusive webinar series where Cisco and Proficio will explore today’s top cyber threats in education and how your institution can prepare. From real-world ransomware case studies to practical resilience planning, we’ll highlight proven strategies to strengthen security in both K–12 and higher education. Attendees gained insight into:Current threat trends in education, including ransomware-as-a-serv...
Add Favorite
Strengthening Federal Cybersecurity wit...
In response to Executive Order 14028, federal agencies are accelerating their adoption of Zero Trust architectures to modernize and secure their IT environments. A critical yet often overlooked component of this transformation is Encrypted DNS, a foundational element that enhances visibility, control and resilience across distributed networks. During this webinar, Infoblox’s Chief DNS Architect, Cricket Liu, and Cybersecurity Strategist,...
Add Favorite
Synthetic Data for Overcoming Data Bott...
As enterprises adopt AI across sectors, many hit the same roadblock: access to usable data. Sharing restrictions, regulatory concerns, and incomplete datasets continue to stall model development and critical decision-making. Download this Rockfish Data webinar exploring how synthetic data can solve these challenges—enabling secure data collaboration, faster AI development, and safer testing at scale. During this webinar, attendees learne...
Add Favorite
Secure by Design: Building Resilient Sy...
With global supply chain attacks escalating, nation-state threats targeting critical infrastructure and AI generating code faster than we can secure it, the real challenge isn't avoiding threats—it's building systems that can withstand them. GitLab hosted a webinar on October 2nd for Cybersecurity Awareness Month to tackle the security challenges that keep government CISOs awake at night. During this fireside chat with GitLab's CISO, Jos...
Add Favorite
Unified Approach for Continuous Threat...
State and local governments and educational institutions face a growing challenge: securing interconnected IT and OT systems from modern cyber threats. Traditional siloed defenses are no longer enough. This webinar pertained to cybersecurity leaders ready to move beyond fragmented strategies and embrace a cohesive ‘whole-of-state’ approach. Attendees explored how to build a unified cybersecurity framework that leverages shared reso...
Add Favorite
Cybersecurity At The Frontlines: SLED C...
State, local, tribal and educational institutions operate at the intersection of high public impact and limited cybersecurity resources. Despite constrained budgets, talent shortages, and an expanding digital threat landscape, SLED CISOs are finding innovative ways to secure critical infrastructure, protect citizen data, and enable resilient services. In this SentinelOne and RNSC Technologies webinar, experienced CISOs shared how they’re...
Add Favorite
Advancing Military and Veteran Health I...
Military and Veteran Health IT leaders face unique security challenges requiring robust and flexible solutions. During this webinar, Zscaler spotlighted Trusted Internet Connections (TIC) 3.0 and its pivotal role in strengthening security while enabling seamless interagency collaboration. Attendees gained insights into implementation strategies and compliance requirements that align with the dynamic needs of the Federal health community. What...
Add Favorite
Vulnerability Management 101
During this on-demand webinar attendees learned:The importance of basic cybersecurity hygiene. The intersection of vulnerability management and MITRE ATT&CKHow vulnerability management plays a role with various standards and frameworks
Add Favorite
Learn How to Achieve CMMC Compliance wh...
Ariento was a leading provider of managed, consulting, and advisory services to the defense industrial base related to the Cybersecurity Maturity Model Certification (CMMC). While not required, CMMC Level 2 certification demonstrated their commitment to their managed service clients and assisted in making their certification assessments easier and more cost effective. On Tuesday, October 21 from 1:00 – 1:30 pm, BeyondTrust’s Kevin...
Add Favorite
Back to Search Begin New Search