Back to Search Begin New Search Save Search Auto-Notify
Why Just-in-Time (JIT) Privileged Acces...
A true least-privilege security model requires users, processes, applications, and systems to have just enough rights and access—and for no longer than required—to perform a necessary action or task. While organizations are increasingly effective at applying the “just enough” piece using privileged access management (PAM) solutions, they have largely neglected the time-limited and persistent risk part of the equation. T...
March 17, 2020
Organizer: AFCEA International
Location: Webcast
Add Favorite
2019 State of the Phish Report
2019 State of the Phish ReportPhishing continues to be the number one attack vector. Why? Because it works — all too well. Industries of every kind fall prey to these scams — from financial organizations to government contractors to healthcare firms. Today’s cybercriminals manage to evade even the most sophisticated security technology through carefully planned, socially engineered email attacks that are only getting more adv...
May 23, 2019
Organizer: AFCEA International
Location: Webcast
Add Favorite
Achieving Instant Situational Awareness...
The proliferation of intelligence, surveillance and reconnaissance (ISR) information is radically changing the landscape of the defense and intelligence community. Command centers’ designers and operators current focus is determining how to use available ISR information sources to assess situations immediately and better support the warfighter. A next-generation command and control infrastructure solution simplifies multi-classification...
May 2, 2019
Organizer: AFCEA International
Location: Webcast
Add Favorite
The State of the Phish: Protecting Your...
Phishing continues to be one of the most dangerous and complex cybersecurity threats facing organizations and end users today. Join Wombat Security Vice President of Marketing, Amy Baker, to review and analyze the findings from the 2017 Wombat Security State of the Phish report. The annual report is compiled from tens of millions of simulated phishing attacks sent through Wombat’s Security Education platform over a 12-month period. The r...
April 12, 2017
Organizer: SIGNAL
Location: Webcast
Add Favorite
Back to Search Begin New Search