Back to Search Begin New Search Save Search Auto-Notify
Security on the Seas Webinar Series: IT...
View this on-demand webinar to learn how network visibility and verification are key to ensuring your zero-trust network architecture. Learn how a behaviorally accurate mathematical model, or Digital Twin, enables you to PROVE your network security posture. And determined blast radius of a compromised host, do full endpoint analysis, check your OS vulnerability… Zero-trust, but verify.
Add Favorite
Adobe eLearning World 2020
For the first time ever, Adobe is taking its annual eLearning Conference online! View Adobe on-demand for 38 sessions of learning, collaborating, and sharing among all levels of learning and development (L&D) professionals. The virtual conference on-demand contains pre-conference workshops along with a 'What's New' keynote session led by Adobe, followed two consecutive days of informative sessions presented by leaders in the eLearning indu...
Add Favorite
Beyond IT Security, Cyber-Physical Conv...
Well past cyber "wake-up calls", recent security events prove that there is nothing more important for organizations than to be prepared for the unexpected. In this era of digital transformation, the line between cyber and physical worlds has faded. Today's blended threats attack deep within connected industrial control systems and networks, yet most organizations still manage and operate their security in silos. In this on-demand session, lea...
Add Favorite
Security, Visibility and Management for...
Government agencies are utilizing Micro-Service Architecture (MSA), the predominant design pattern for application development, but these evolved patterns have introduced new challenges and complexities to understand. James Harmison, a senior solutions architect at Red Hat with over a decade of experience in operationalizing applications for enterprise use, addressed: The concerns that teams have as they try to deploy MSA applications into pro...
Add Favorite
Adobe Sign Webinar Series: Embrace Seam...
As organizations across the country continue to operate remotely, digital processes, such as e-signatures, have never been more crucial to an agency's success. E-signatures eliminate the hassle of printing, signing, and scanning documents for streamlined delivery services and reduced delays that come with tracking forms manually. Adobe Sign will have you saving paper and tossing the pen to deliver fast, legal, and secure services through 100%...
Add Favorite
Adobe Flash End-of-Life Webinar Series
Most eLearning content is based on the technology of Adobe Flash, but by the end of 2020, Adobe will stop supporting Flash and Flash Player. View our on-demand webinar series to learn how to transfer your eLearning content over from Adobe Flash and discover the endless possibilities of HTML5! The Road Forward: Using HTML5 as an Adobe Connect Host Adobe Connect is seeing its most significant change to date. Join us to learn more about this exc...
Add Favorite
Adobe Flash End-of-Life Webinar Series
Most eLearning content is based on the technology of Adobe Flash, but by the end of 2020, Adobe will stop supporting Flash and Flash Player. View this on-demand webinar series to learn how to transfer your eLearning content over from Adobe Flash and discover the endless possibilities of HTML5! Conversion Crash Course: Updating Your Materials with Only 4 Months Left If you’re joining this program already in progress, you may not have beg...
Add Favorite
Adobe Sign Webinar Series: Embrace Seam...
As organizations across the country continue to operate remotely, digital processes, such as e-signatures, have never been more crucial to an agency's success. E-signatures eliminate the hassle of printing, signing, and scanning documents for streamlined delivery services and reduced delays that come with tracking forms manually. Adobe Sign will have you saving paper and tossing the pen to deliver fast, legal, and secure services through 100%...
Add Favorite
Cyber Insurance: Insider Tips to Ace Un...
Join BlackBerry and Carahsoft to learn how the preparations and choices you make before and during the underwriting process will lead to vastly different outcomes in the cost of your premiums. Stan Gatewood, a former Chief Information Security Officer will address this topic while receiving insider tips from Jeffrey Smith, Managing Partner at CyberRisk Underwriters. View this on-demand webinar to hear from two leading experts within the indust...
Add Favorite
Elevate Your Threat Hunting Program
The complexity of today's networks and the sheer amount of information being provided has made threat hunting a necessary part of every security program. Discover how ReversingLabs can enrich Splunk data with our industry leading threat intelligence. We will show you how to easily hunt for threats specifically targeted at your organization using our Splunk app which enables quicker malware identification and visualization. During this on-deman...
Add Favorite
Back to Search Begin New Search