181 webcasts found
+ 3470 past events found
Back to Search Begin New Search Save Search Auto-Notify
Splunk Webinar Series: To the Basics an...
Curious about how Splunk can help your organization? Join us for this informative on demand webcast series where we will discuss a variety of topics ranging from Splunk 101, machine data, IT operations, security, and more. This series will provide a wide overview of how you can leverage your machine data, gain real-time insights, and make smarter business decisions within your agency. There's An App for That: Splunk Security Essentials Your or...
Add Favorite
MetaAccess: Next Generation Network Acc...
Agencies are increasingly challenged by the proliferation of risky, unmanaged devices in the age of bring-your-own-device in the workplace. Fortunately, there is a surprisingly simple way to tame all those potentially rogue devices with industry-leading endpoint security and advanced threat prevention technologies. OPSWAT MetaAccess empowers organizations to enforce internal security standards, meet security, and regulate compliance across all...
Add Favorite
Enhance Your Security Posture with Info...
Cybercrime is growing in complexity and scale, but security teams cannot respond to incidents fast enough. Improved response times requires multiple stakeholders, better information and processes. Throwing more people at the problem is not possible, nor the correct solution. Implementing and integrating security tools that allow you to simplify, do more with less and build adaptive security architectures to protect your critical infrastructure...
Add Favorite
Get Ahead of Ransomware with Splunk & AWS
From medical record systems to public transportation infrastructure, the onslaught of recent ransomware attacks has upended organizations around the world. Although a security issue, the fast propagation and business-impacting nature of these attacks shows that ransomware is a greater concern that affects all of IT.How can you better prepare and respond to such threats?Join us and learn how to apply broader analytical approach and data-driven...
Add Favorite
Root Process Protection through Encrypt...
You are invited to our live webinar with Thales on November 19th where we will take a data-centric security approach to the discussion beginning with the application stack and highlight where and why industry best practices for encryption, policy, and access controls can be applied. Join us to learn about Thales' Root Process Protection through Encryption within Docker-Kubernetes. We'll cover protecting structured and unstructured data at rest...
Add Favorite
Addressing Malware: A Layered Security...
What do the City of Albany, City of Atlanta, City of Baltimore, Cleveland Hopkins International Airport, North Carolina's Onslow Water and Sewer Authority, and The United States Department of Homeland Security have in common?Ransomware.We've all heard of ransomware before, but how do we understand the associated risks and prevent it, given limited resources? If your organization believes it could be better protected against ransomware, join Ca...
Add Favorite
Advancing the Maturity of Your Organiza...
As recent as five years ago, putting up strong network controls and ensuring a defense-in-depth posture was enough to keep the bad actors out of a network and minimize the risk of a cyber-attack. However, times have changed and the delineation of organizational perimeters has blurred between on-premise and cloud-based resources. This is especially true due to the increase in users needing to access resources and accounts remotely. Identity is...
Add Favorite
Bugcrowd Webinar - Crowdsourced Securit...
With new attack vectors comes an increase in the number of ways that known and unknown vulnerabilities can be exploited. To level the playing field, organizations are turning to crowdsourced security.The Crowd -- the community of hackers, researchers, and pentesters on Bugcrowd's Crowd control platform -- identifies vulnerabilities that attackers exploit, which in turn protects organizations of all levels. Therefore, it comes as no surprise th...
Add Favorite
Delivering the Power of Collective Cybe...
Since IronNet was founded in 2014 by General Keith Alexander, the mission has been to deliver the power of collective cybersecurity to defend companies, sectors, and nations so that we all can live and work with peace of mind in cyberspace. Today, organizations around the world turn to IronNet to detect known and unknown cyber threat targets in their networks and share that information with peers so that all members can collectively defend aga...
Add Favorite
Secure Your Move to Cloud with Zero Tru...
The promise of cloud and mobility is to provide access to key services quickly and comprehensively - any user, any location, any time, any device. Security teams are embracing technologies that ensure productivity while retaining visibility and control, as applications migrate from datacenter to cloud and users are increasingly outside any security perimeter.To clarify this complex topic, NIST has published Draft Special Publication 800-207, d...
Add Favorite
Back to Search Begin New Search