Back to Search Begin New Search Save Search Auto-Notify
Collibra Data Intelligence in the Cloud...
As government agencies continue to modernize and innovate to achieve mission with AI and ML technologies and using data, Collibra empowers them to have trusted data assets to drive strategic insights. Government agencies around the world trust Collibra to meet standards of privacy, reliability, and compliance. Join our security and cloud experts for this session of our webinar series, where attendees will: Learn about the Collibra FedRAMP envi...
Add Favorite
Unifying Cyber Defense Teams with Share...
The ThreatQ platform is designed to improve security operations workflows by delivering immediate and significant value across multiple use cases to include data management, prioritization, integrations, collaboration, and curated threat data sharing. ThreatQ provides the ability to securely share curated threat data between organizations automatically. Whether to block an IP, detonate a malicious file, or alert an organization to a possible n...
Add Favorite
Building an Effective Identity and Data...
79 percent of organizations have experienced an identity-related security breach in the last two years and the number of breaches continues to rise. With the exponential growth in unstructured data each year, coupled with cloud adoption and IoT devices, it is critical that organizations address their Identity and Data Management (IDM) program. So where is the best place to start? Having a foundational understanding of the current state of Iden...
Add Favorite
Cybersecurity Executive Order Challenge...
The recent ransomware attacks on software supply chains have highlighted the need for improved national cybersecurity efforts. The Executive Order on improving the nation's cybersecurity emphasizes the reality that federal agencies are equally exposed to cyber threats as commercial organizations. Register now for Micro Focus' webinar on the Cybersecurity Executive Order Challenges and Strategies. In this webinar, Senior Cybersecurity Executive...
Add Favorite
Email: The Most Significant Threat to Y...
Email remains a significant security threat for organizations because cybercriminals continue to favor email to distribute malware, phishing scams, and spam. Why? Because it works. Email can easily be copied to appear legitimate, and it gets delivered to the end-user, wanted or not. Join Trustwave on Tuesday, July 27th, to hear their Sr. Product Manager unpack the Trustwave 2021 Email Threat Report. You'll have the opportunity to learn about:...
Add Favorite
ExtraHop Demo Desk
Agencies today are working across different platforms and environments, creating a complex web of workloads consisting of hardware, applications, and data spread. Whether it's on edge, core, remote workforce, or cloud deployments, visibility is essentially to ensure security within the organization. Now, as a hybrid, multi-cloud, and containerized environments are standing up, unifying security controls across different environments is critica...
Add Favorite
Streamline DOJ SOC Operations Using Spl...
Security teams across the Department of Justice face an ever-increasing number of security incidents that often require manual investigation efforts to identify, analyze, and mitigate these threats facing their organizations daily. Join us for a presentation on how customers have reduced response and resolution time through security orchestration and automation via Splunk SOAR. During the presentation, we will discover how Splunk SOAR can prov...
Add Favorite
Protect and Enhance your DNS Security P...
Join this Infoblox webinar to discover why it's critical to protect your DNS infrastructure, how to protect DNS, and how to use DNS to improve your existing layered security approach. The training will address the most common challenges organizations face to mitigate DNS security threats. Attendees will learn how modern DNS security threats circumvent typical security architecture and why DNS-specific security controls are needed today. Infobl...
Add Favorite
Nuvolo OT Security Webinar
Why OT Security is CriticalShutdowns of Pipelines, Restaurants, Hospitals, and WarehousesThe increasing use of network connected equipment has helped organizations become more automated. However, this operational technology (OT) can be susceptible to security exploits and vulnerabilities causing possible malfunction. Yet, traditional IT security tools don't do a good job at helping maintenance teams to quickly perform corrective actions. In th...
Add Favorite
AI Ops Security: An XDR for Cyber Contr...
In response to the unprecedented growth of malware attacks, the Federal Government built a web platform dedicated to educating organizations on managing their exposure and risk. It begins with constantly patching all devices, disabling certain communications protocols, and defending against phishing attacks. Carahsoft's AI Ops Security for Small and Medium governments simplifies these tasks in a unified, fully-managed solution that plugs strai...
Add Favorite
Back to Search Begin New Search