Back to Search Begin New Search Save Search Auto-Notify
4 Steps to Building a Strong Identity-C...
Building a foundation for modern security that can meet current and future requirements must remain a top priority for federal agencies. But as agencies pursue both IT modernization and zero-trust security, it’s easy to get lost in the complexities and lose focus. As always, the underlying enabler is identity security. Join us online Tuesday, Dec. 13, at 2 p.m. ET/11 a.m. PT when government and industry leaders will help us cut through t...
December 13, 2022
Organizer: GovLoop
Location: Webcast
Add Favorite
Rethink How You Demonstrate the Busines...
CIOs and technology leaders struggle to demonstrate the value of their initiatives to the business, but current ROI models don’t adequately account for outcomes delivered to stakeholders beyond shareholders. Without a clear understanding of the value created and the impact on the organization’s mission-critical priorities, technology investments are often perceived as a cost center rather than strategic to the organization. Investm...
December 13, 2022
Organizer: Gartner
Location: Webcast
Add Favorite
Achieve Complete Compliance in Cloud an...
Organizations can now proactively analyze workloads irrespective of which cloud service provider they have chosen. In this webinar, you'll see Runecast’s latest addition supporting the Google Cloud Platform. With AWS and Microsoft Azure already supported, Runecast now protects all three of the top cloud providers. We’ll also take a closer look at the new Kubernetes intelligence in Runecast that brings image scanning and container-s...
December 13, 2022
Organizer: Runecast
Location: Webcast
Add Favorite
Not Your Average Cloud: Transforming Cl...
Cloud infrastructure today is all built by composition. A disparate mix of hardware and software that must be composed into a final solution that is complex to build and costly and fragile to operate. But does it have to be this way? Join SoftIron CTO Kenny Van Alstyne in this session to explore and understand the transformative technology that underpins SoftIron’s HyperCloud - the world’s first complete technology for building clo...
December 13, 2022
Organizer: Softiron
Location: Webcast
Add Favorite
Accelerate Compute; Scaling Out to the Edge
New accelerated computing infrastructure provides significant advantages for drug discovery, industrial automation, the retail industry, autonomous driving, and enterprise machine learning operations. Supermicro provides the infrastructure building blocks to make it all possible.
December 13, 2022
Organizer: Supermicro
Location: Webcast
Add Favorite
Red Hat Enterprise Linux Workshop
Join Red Hat® for a hands-on technical workshop and learn how Red Hat Enterprise Linux® can help you deploy, manage, and innovate on a platform that will meet your needs today and scale for the future. Today, IT organizations must maintain the status quo and keep an eye on the future. Delivering value to the business means being able to deliver services and applications quickly while maintaining the infrastructure already in place. Red...
December 13, 2022
Organizer: Red Hat
Location: Virtual
Add Favorite
Can You Hack It? An Expert View on Cybe...
Join us for a roundtable conversation with leading cybersecurity expert, Andrew Gorecki, the author of Cyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk. Andrew spent several years in the trenches of breach response leading large-scale investigations and remediation for Fortune 500 companies and is eager to share his learnings. During the session, Andrew will cover the following topics: The evolution...
December 13, 2022
Organizer: Red Hat
Location: Mountain View, CA
Add Favorite
How to Protect Your Organization from I...
Cyber attacks from external sources aren’t the only threats organizations must consider nowadays. Malicious and negligent employees, some with stolen credentials, have become a serious and growing security risk to organizations today. Insider threat incidents have risen 44% over the past two years with the per-incident cost averaging $15M. And even IT workers are being actively recruited from ransomware groups like Lapsus$ to access comp...
December 13, 2022
Organizer: Constella Intelligence
Location: Webcast
Add Favorite
Spyware for Sale: The Growing Threat to...
The monetized world of cybercrime is not a new concept, and until recently the highly technical malware did not reach into the mobile world. But like everything else, that has changed. Cybercriminals see the widely adopted frontier of mobile as a valuable target for increasingly advanced malware and services, and for the right price, are ready to sell to anyone. Advanced mobile malware, like spyware, is no longer a product just for nation stat...
December 13, 2022
Organizer: Zimperium
Location: Webcast
Add Favorite
Multi-factor Authentication: An Essenti...
Multi-factor authentication (MFA) is an essential component of cybersecurity that should be considered by enterprise businesses of all industries and sizes. With nearly 20% of organizations experiencing data breaches caused by stolen or compromised credentials, protecting organizational networks and resources with multi-factor authentication (MFA) is more important than ever. We will look at: What is Multi-factor Authentication? Why is there a...
December 13, 2022
Organizer: GlobalSign
Location: Webcast
Add Favorite
Back to Search Begin New Search