Back to Search Begin New Search Save Search Auto-Notify
Tackling the Zero Trust Challenge with...
View this on-demand recording to discover what attendees learned during our Zero Trust webinar, topics including: Why Zero Trust security is important for Critical Infrastructure How to communicate the value of Zero Trust in OT to key business decision makers A simple and scalable methodology for analyzing and planning Zero Trust protection Tools to implement Zero Trust controls in OT brownfields and converged IT/OT environments How Zero Trust...
Add Favorite
Fireside Chat: Federal Cybersecurity Di...
Orca Security and Carahsoft invited individuals and their teams to join them for a virtual, interactive fireside chat with Coalfire to discuss alignment to Federal cybersecurity directives which impact every public sector organization. This webinar was joined by Doug Hudson, VP of Public Sector at Orca Security, and Nate Demuth, VP of Cloud Services at Coalfire, during a moderated session with Neil Carpenter, Principal Technical Evangelist at...
Add Favorite
Increase Operational Efficiency with Fo...
Attendees learned more about the partnership between Forescout & Splunk at our webinar. This was a live session with two of our in-house demo specialists for an informative and interactive discussion that helped attendees better understand how the use cases and capabilities of Forescout and Splunk can help organizations maximize SOC efficiency and enterprise visibility.
Add Favorite
The New Cybersecurity Strategy - What Next?
We invite you to watch our webinar that occurred on May 24th, which aimed to provide solutions to the challenges posed by implementing current mandates, executive orders, and the new cybersecurity strategy. Navigating the complexities of implementing these measures can be a daunting task, and we at Veracode understand the difficulties faced by government agencies. Our esteemed panelists, Sam King, Chris Wysopal, and John Zangardi, are industry...
Add Favorite
Power Zero Trust Outcomes with Trellix
With the Zero Trust Maturity Model as our guide, Trellix invites Federal Agencies to learn about what strategic investments can be made today to help reach long term Zero Trust goals. During this on-demand session attendees learned about: How XDR can help with the maturity progress across multiple pillars. How to leverage existing investments to achieve Zero Trust outcomes The importance of contextualizing data from multiple sources to surface...
Add Favorite
Operationalizing Zero Trust with Deep O...
Network blind spots prevent Zero Trust deployment from being successful due to the lack of visibility into network telemetry. As the network grows and evolves, this pain will worsen if not addressed at the foundational level. Gigamon Deep Observability ensures your tools and Zero Trust policy engine have access to all network-based communications in your organization. For any effective Zero Trust implementation, full network visibility and eli...
Add Favorite
TechNet Cyber Webinar Series: Demystify...
In this on-demand webinar, attendees learned: How to avoid pitfalls in your ZTA implementation Technical and non-technical ZTA aspects Key aspects of the ZTA data pillar
Add Favorite
Zero Trust and the Future of Compliance...
Participants joined us and our panelists from Qmulos, Deloitte, and Cisco in a thought-provoking webinar that delves into the heart of Zero Trust and its transformative impact on security and compliance. We will chart the path to compliance modernization, demonstrating how Zero Trust forms the bedrock of an advanced, data-driven security architecture. This session empowered IT professionals, compliance officers, and corporate leaders to align...
Add Favorite
Zero Trust & SecOps Automation: The Fut...
Department of Defense (DoD) agencies are taking concrete steps to transition to a zero-trust architecture to protect critical data and systems. Transitioning to a zero-trust architecture requires a fundamental reimagining of security operations centers (SOCs) and teams. SOCs have traditionally been structured around the role of the security operator, rather than the data and lacked both automation and DevOps practices. To establish a true zero...
Add Favorite
Mastering the DoD Zero Trust Journey: B...
In a rapidly changing digital landscape, federal agencies face a constant battle against cyber threats. With the stakes higher than ever, you need a strategic advantage to safeguard your agency's sensitive assets and ensure the resilience of the Department of Defense network environment. Embracing the DoD Zero Trust Strategy is the key to unlocking this potential and positioning yourself as a hero in this evolving story. View the engaging webi...
Add Favorite
Back to Search Begin New Search