Back to Search Begin New Search Save Search Auto-Notify
AI and State-Sponsored Espionage - A We...
Attendees joined Google Cloud, Mandiant, and GuidePoint Security for panel discussions focused on the dangers of state-sponsored cyber espionage and how Artificial Intelligence (AI) is rapidly changing the world and, with it, the landscape of cyber threats.AI is being utilized by both attackers and defenders, with the adversarial use of AI posing a growing concern.Recent trends indicate that cyber espionage is on the rise, and the employment o...
Add Favorite
From Legacy to Leading Edge: Embracing...
As organizations pivot towards digital-first strategies, the imperative to adopt scalable and flexible identity frameworks has never been more critical. In an increasingly interconnected world, it is crucial for organizations to build a resilient identity architecture that not only supports current needs but anticipates future demands. CyberArk and UberEther explored the transformative journey from traditional, on-premises identity management...
Add Favorite
How to Hunt for Volt Typhoon Malware in...
The federal government has strenuously and repeatedly stated that critical infrastructure providers must be proactive in hunting for malware that may be present in networks, focusing specifically on CCP-sponsored Volt Typhoon Adversary. Attendees joined critical infrastructure experts for a panel discussion on how to hunt for Volt Typhoon. Discussion topics included:How Four18 Intelligence uses UnknownCyber ThreatHunter to hunt for Volt Typhoo...
Add Favorite
Enhancing OSINT Investigations with Dar...
In the realm of Open Source Intelligence (OSINT), the ability to gather, analyze, and interpret publicly available information is critical. This webinar explored the world of OSINT investigations, highlighting how the strategic use of dark web data can significantly enhance OSINT information to identify threats and risks posed to organizations. During this session, Erin demonstrated the following using DarkOwl Vision:Gathering, analyzing, and...
Add Favorite
Navigating the Future of Procurement wi...
Attendees embarked on a trailblazing journey into the future of government procurements as Aretec and Google Cloud unveiled the power of AI in government environments. This in-depth session explored the transformative potential of enterprise search technologies in streamlining government procurement processes. Attendees discovered how advanced search solutions powered by artificial intelligence and machine learning can enhance efficiency, visi...
Add Favorite
Strengthening Your Security with Active...
Even the most robust identity governance solutions miss out on the foundational needs of highly secure directory management tasks. By leveraging intelligence already available in your directory, you can improve the security profile of your organization with easy-to-use practical solutions. Attendees joined Netwrix on Wednesday, July 17th, to learn how to discover areas of weaknesses and strategies to address these hidden dangers proactively. A...
Add Favorite
Uncork DevSecOps, Modern Delivery and C...
As the driving force behind Jenkins, the world's leading CI/CD tool, CloudBees has spearheaded DevSecOps enterprise-scale deployments for over a decade, driving innovation in government Software Factories like the DoD’s Platform One. Attendees joined CloudBees in Reston, VA to hear key DevSecOps lessons for the systems integrator community, followed by a complimentary whiskey tasting. Technologists and strategists covered topics such as:...
Add Favorite
Harnessing the Power of Public Web Data...
This was an insightful webinar where we introduced the Socialgist data platform and demonstrated how we gather publicly available web data at scale to enhance Open Source Intelligence (OSINT) analytics projects. During this webinar, attendees were able to:Learn about the capabilities of Socialgist in indexing and filtering public web dataDiscover practical applications of public web data in OSINT analytics to gain actionable insightsExplore an...
Add Favorite
Next-Gen AI for Government: Optimize Pe...
Government agencies face a multitude of pressures to leverage artificial intelligence (AI) for improved efficiency, cost savings, and enhanced citizen services. Increasing demands for transparency, accountability, and responsiveness require innovative solutions. However, translating pilot AI projects into operational realities can be a complex challenge. Data silos, inconvenient development processes, and ensuring model fairness and explainabi...
Add Favorite
A New Paradigm for Managing Third-Party...
The MOVEit and GoAnywhere attacks in 2023 ushered to the forefront the importance of having a viable and adaptive third-party risk strategy. If there had ever been the feeling that third-party risk was a secondary stakeholder in the cybersecurity space, the importance of which was elevated only for short periods of time during a crisis, these two attacks shattered that notion entirely. This new reality has compelled security strategists to rap...
Add Favorite
Back to Search Begin New Search