66 past events found
+ 5 on-demand webcasts found
Back to Search Begin New Search Save Search Auto-Notify
Get More Out of Your Gigamon
The goals and milestones prescribed in OPM Memorandum M-21-31 seem almost impossible to achieve, which include improving the capabilities related to cybersecurity incidents. Join Gigamon and Carahsoft to learn how Deep Observability can help you fast-track your compliance with the Memorandum's objectives all-the-while achieving a foundation for a scalable Zero Trust Architecture. In this complimentary webinar, we will discuss: What M-21-31 is...
March 1, 2022
Organizer: Gigamon Government Team at Carahsoft
Location: Webcast
Add Favorite
Deep Dive INSIGHTS: Fighting Ransomware...
Join experts George Sandford, leader of our ThreatINSIGHT Technical Success Management team and Michael Lazic, a member of Gigamon Applied Threat Research as they discuss how ransomware has forced security teams to shift priorities as organizations see ransomware’s potential impacts across the business. In this webinar, they will walk you through: Why the network is critical infrastructure Key reasons network visibility is important Real...
February 9, 2022
Organizer: Gigamon
Location: Webcast
Add Favorite
CISO INSIGHTS: How to Prepare for the R...
Join our distinguished panel of Cybersecurity executives as they discuss why ransomware, extortion, and other attacks are becoming more prevalent and how you can prepare to get ahead of the curve. The panel, moderated by Robert Rodriguez, Founder of SINET, will bring together industry leaders — Nick Shevelyov (CISO, Silicon Valley Bank and best-selling author of Cyber War…and Peace), Edna Conway (VP, Chief Security & Risk Offi...
February 2, 2022
Organizer: Gigamon
Location: Webcast
Add Favorite
Zero Trust for the Cloud Era: New Use C...
Zero trust is increasingly a guiding principle for modern cybersecurity programs. With an ESG survey finding that for 51% of enterprise respondents it’s the top driver of adopting zero trust - ahead of reducing the number of cybersecurity incidents and supporting Digital Transformation - there’s no denying that zero trust is now central to cybersecurity modernization. You may ask: ‘Weren’t organizations starting to impl...
January 26, 2022
Organizer: Gigamon
Location: Webcast
Add Favorite
The Rise of Ransomware: Planning for Wh...
Think your backups are a panacea for ransomware defense? Think again. Traditional backups are no longer enough and despite ransomware being a popular business model for cybercriminals for years, it’s gaining relevance with supply chain attacks, and big game hunting - attacks on enterprises - are increasing. Graff, JBS, Colonial Pipeline and software manager Kaseya are just some of the businesses held to ransom recently. With Colonial pay...
January 19, 2022
Organizer: Gigamon
Location: Webcast
Add Favorite
Cloud Migration: Who Is Responsible For...
Fingers crossed, life is starting to get back to normal, and the winning streak cloud-based services saw as a result of the pandemic shows no sign of slowing down as businesses move to embrace hybrid and ‘work from anywhere’ models. Yet despite the numerous benefits of the rapid migration to cloud - collaboration where previously there were silos ranking near the top - the stark reality is that cyber security for the cloud era is f...
January 12, 2022
Organizer: Gigamon
Location: Webcast
Add Favorite
Understanding TLS Decryption: Deploy Yo...
The final webinar in our three-part Tech Talk series on TLS Decryption provides practical advice on how to seamlessly deploy a decryption solution to effectively combat malware threats from encrypted traffic.You’ll learn everything you need to know about implementation, including: Planning Validation Integration
November 9, 2021
Organizer: Gigamon
Location: Webcast
Add Favorite
Understanding TLS Decryption: Design Yo...
This Tech Talk webinar on designing a decryption solution to reduce malware threat is the second in a three-part series on TLS Decryption.You’ll learn how to create a solution that centrally decrypts encrypted traffic to eliminate blind spots, frees up tools capacity and complies with privacy needs, including: Requirements Architectures Best practices
November 2, 2021
Organizer: Gigamon
Location: Webcast
Add Favorite
Improving Management and Protection of...
Virtualization remains at the forefront of the data center, and is extending into the cloud to enable true hybrid and multi-cloud environments. These environments are being augmented by new technologies, including containers, software-defined storage, networking, and other capabilities. Operations are looking for ways to optimize all aspects of their virtual environment.In this webinar, we will discuss: Lessons about network traffic visibility...
October 5, 2021
Organizer: Gigamon
Location: Webcast
Add Favorite
Securing the Hybrid Cloud: Visibility B...
With the move to cloud and the multitude of approaches, your ability to effectively monitor and secure workloads gets even more difficult. IT complexity, the rate of change, lack of skills, and organizational silos have made confidently managing security and performance nearly impossible. Join our session for a discussion of the security considerations for on-prem private, public and hybrid clouds. You'll learn best practices and see how a lit...
August 11, 2021
Organizer: Gigamon
Location: Webcast
Add Favorite
Back to Search Begin New Search