Back to Search Begin New Search Save Search Auto-Notify
Tableau Enablement Series Part 5: Secur...
In today's data-driven landscape, ensuring the security of your analytics environment is paramount. Join our webinar to enhance your Tableau security expertise and explore how cybersecurity principles intersect with Tableau's features to ensure secure data access for your users. During this webinar, attendees learned how to: Step up their Tableau security game: Attendees learned how to leverage Tableau's built-in features to secure their analy...
Add Favorite
Optimizing Performance and Security in...
On Thursday, May 30, 2024, an expansive panel of industry experts from Heimdall Data, Eon Collective and VMware by Broadcom gathered to present an enlightening event focused on critical aspects of cybersecurity, tailored specifically for IT personnel. This event was hosted by Carahsoft in collaboration with Amazon Web Services (AWS). Click to download a copy of the slide decks presented.
Add Favorite
AI and State-Sponsored Espionage - A We...
Attendees joined Google Cloud, Mandiant, and GuidePoint Security for panel discussions focused on the dangers of state-sponsored cyber espionage and how Artificial Intelligence (AI) is rapidly changing the world and, with it, the landscape of cyber threats.AI is being utilized by both attackers and defenders, with the adversarial use of AI posing a growing concern.Recent trends indicate that cyber espionage is on the rise, and the employment o...
Add Favorite
Webinar Recording: Cyber-securing Safet...
Safety is the top priority in almost all mines, and reliable, efficient physical operations are close seconds. Cybersecurity is essential to all these priorities, in a world where automation is remotely accessible and where many mines are the targets of threats from sophisticated ransomware criminals to nation states. In addition, the trend towards cloud computing and cloud-based predictive maintenance services complicates cybersecurity and ex...
Add Favorite
Implementing Zero Trust Controls and Mo...
Cybersecurity compliance frameworks are curated with the most effective methodologies an organization can take to prevent cyberattacks and reduce the impact if one occurs. If passed in current form, NIST 800-171A Rev.3 final public draft will adopt substantial changes to existing compliance controls required by the Cybersecurity Maturity Model Certification (CMMC). All those within the Defense Industrial Base will be required to observe substa...
Add Favorite
Generative AI: Uses and Abuses in Cyber...
As organizations around the globe grapple with the implications of Generative AI (GAI) in cybersecurity, we recognize the importance of understanding its true impact and potential vulnerabilities. With the rise of GAI in both legitimate and malicious contexts, it is crucial to discern between hype and reality. This webinar, hosted by Trend Micro and Carahsoft, explored the nuances of GAI, particularly focusing on its utilization by threat acto...
Add Favorite
Maximize Security Detection with CrowdS...
CrowdStrike | Mimecast State, Local and Education webinar was on June 11th. During this webinar, Omar Cordova, Senior Sales Engineer at Mimecast, and Josh Radlein, Solutions Architect at CrowdStrike discussed how you can help secure your customer’s environments from sophisticated, targeted threats.In the current cybersecurity climate, organizations need to protect themselves from the increasing volume and impact of ransomware, impersonat...
Add Favorite
Piercing the Near-Peer Cyber Perimeter:...
In today's world, protecting national security requires understanding the global cyber operations landscape, particularly the activities of Great Powers countries. SpyCloud's Identity Intelligence offers a unique perspective into this challenging space, helping to uncover the tactics and trends used by advanced actors. This event showcased an in-depth analysis of compromised data, revealing connections beyond traditional near-peer threats.Acce...
Add Favorite
Bridging Zero Trust and Insider Risk Ma...
As federal agencies adhere to the Zero Trust mandate, the incorporation of insider risk management within its framework is imperative. This fusion is particularly critical amidst today's evolving threat landscape, as the federal government bolsters its cybersecurity posture. This webinar explored the intricate and powerful combination of Zero Trust and insider risk management! During the session, our speakers:Identified challenges and solution...
Add Favorite
Take home the GOLD with Veeam Data Protection
Join us for an interactive LEGO experience with Jeff Reichard, Vice President Solution Strategy at Veeam who showed Veeam's latest integrations allowing you to combine secure data protection with your existing security toolset and Adam Ward, LEGO extraordinaire, who simultaneously guided us through the assembly of an Olympics-themed LEGO model to inspire your data security efforts.
Add Favorite
Back to Search Begin New Search