Back to Search Begin New Search Save Search Auto-Notify
Enhancing Recovery from Natural ...
Attendees of this webinar listened as VMware's Senior Staff Solutions Engineer, Matthew Place, discussed: What is a disaster? Disaster Recovery vs. Ransomware Recovery – how are they different? A review of VMware disaster recovery capabilities A demo of a recovery scenario Register to view this on-demand recording.
Add Favorite
The New National Cybersecurity Strategy...
Attendees of this webinar joined OPSWAT for a discussion around the new National Cybersecurity Strategy, that builds upon previous efforts, such as Zero Trust, to bolster protections to secure America’s cyberspace and its digital ecosystem. The reliance on critical infrastructure makes those who manage it big targets for nation-state and ransomware attacks, as well as any members of the Defense Industrial Base that are managing the criti...
Add Favorite
M-21-31: Achieve Compliance through Com...
Attendees of this Axonius, Splunk & Carahsoft webinar learned: How to gain true visibility of your entire attack surface How to meet recent federal regulations mandating regular and comprehensive logging management How to optimize your internal logging management to aid in addressing increasingly sophisticated threats How asset visibility and logging can shore up resiliency across progressively complex IT, security and operations cyber env...
Add Favorite
From the Front Lines to Leadership: How...
According to Chainalysis’ recent survey, 74% of respondents say agency employees currently are not well-equipped to investigate cryptocurrency-related crime. However, they’re seeing a rise in criminal activity. Access this on-demand webinar to hear leading experts discuss how law enforcement agencies can close the gap between this rise of criminal activity being seen on the ground and the limited resources agencies have to investig...
Add Favorite
Unraveling Digital Supply Chain Threats...
Attendees of this webinar joined Eclypsium for a discussion around digital supply chain threats, risks, and the hidden challenges that organizations are facing in safeguarding their device supply chains. Some key highlights from this discussion were: The role of Software Bill of Materials (SBOMs) in mitigating vulnerabilities and ensuring supply chain integrity. Practical strategies to tackle supply chain issues head-on, based on eye-opening i...
Add Favorite
Diving into BOD 23-01: Why Asset Visibi...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) published the Binding Operational Directive 23-01 for Improving Asset Visibility and Vulnerability Detection on Federal Networks with April 3, 2023 deadlines for all FCEB agencies. CISA’s asset visibility requirements are doing a big part in moving the industry forward and evolving the overall approach to asset inventory while also highlighting the importance of a comprehen...
Add Favorite
Splunk SOAR: Automation for the Modern SOC
During this webinar, we explored the ongoing challenges facing DOJ security teams and how Splunk SOAR can help you decrease incident response time while being a force multiplier for your teams. During this on-demand webinar, participants learned about: Challenges facing our security operations teams today The differences between Security Orchestration, Automation, and Response (SOAR) How SOAR can be a force multiplier for your organization and...
Add Favorite
NVIDIA Software for Government Series
As cybersecurity threats continue to escalate and diversify, agencies must look for new ways to address them. Collecting and analyzing all of the data across a network in real time is cost-prohibitive and difficult—unless you can leverage accelerated AI. NVIDIA Morpheus is an open application framework that enables cybersecurity developers to create optimized AI pipelines for filtering, processing and classifying large volumes of data. E...
Add Favorite
Confluent Tech Talk Series
Confluent and Carahsoft led a series of five virtual Government Tech Talks from July to October 2023. Each session is designed to enable architects, software engineers and developers in the public sector to power mission outcomes, better serve constituents, ensure security and compliance, enhance IT efficiency and maximize productivity with a platform built for data in motion.Register for access to all five on-demand recordings: Wednesday, Jul...
Add Favorite
Avoid Downtime by Protecting Your Opera...
Cyber-attacks on critical infrastructure increased 2000% in 2022, often damaging critical operations. Remote vendors and workers have complicated the situation even more by using personal laptops, BYOD and other devices with fewer security barriers on their home networks than they would have in the workplace. These remote connections have blurred the IT-OT segmentation and expanded the attack surface providing new entry points for hackers to e...
Add Favorite
Back to Search Begin New Search