208 webcasts found
+ 1461 past events found
Back to Search Begin New Search Save Search Auto-Notify
Enhance Visual Insight from Your Aerial...
When it comes to gathering visual data, drones can assist while reducing risk, saving time, and decreasing costs. These aerial systems come in all shapes and sizes and can utilize a variety of sensors depending on the task at hand.So, how do you pick the right one for the job? Start with your desired data and work backward from there. The data you need will determine the requirements of your vehicle. Register today for our complimentary webina...
Add Favorite
Turn Data Into Doing with Splunk - Week...
The speed and the velocity of the decisions that public sector leaders have to make has increased, and the criticality or impact of those decisions is increasing as well. Getting every decision right could make or break the mission. That's ultimately the challenge today. How can I make decisions faster? And how can I be more confident in each decision that I make? Join Splunk for our on-demand weekly webinar series to learn more about how brin...
Add Favorite
Learn How to Mobilize Your Workforce wi...
Join VMware and Carahsoft for a presentation of GANTECH's managed services, enhancing VMware's Digital Workspace Technologies built on top of Microsoft Azure. Learn how you can leverage a remote solution accessible anytime, anywhere, on any device to positively impact and mobilize your workforce. This turn-key solution provides your organization with the flexibility and agility of a consumption-based model built-to-scale to meet your growing b...
Add Favorite
Splunk & Forescout for Smart Transportation
Join Splunk, Forescout, and Carahsoft to see how Forescout provides continuous visibility of connected devices to Splunk to better identify, prioritize, and respond to incidents. The joint integration also enables the getting and storing of Forescout actions in Splunk. Policy-driven actions can be triggered by Splunk and executed through Forescout for immediate incident response. Forescout sends the action results to Splunk to facilitate close...
Add Favorite
Putting MITRE ATT&CK Into Action
Utilizing compromised or fraudulent credentials are a disproportionate hot spot in threat reports. So, it makes sense to look for that in your threat hunting. But where do you start? The answer is MITRE ATT&CK. In this session, Exabeam will close the loop between MITRE ATT&CK TTPs and deep analysis of security events to recognize malicious activity that is difficult to distinguish from innocent day-to-day operations. Join us for this o...
Add Favorite
Validate Cloud Migration Plans with Wor...
Join our Virtana webinar to learn how Cloud Migration Transformation success depends on plans distilled into insights and answers to your questions before, during, and post migration. In this webinar, you will learn how to: Estimate and compare cloud networksExecute full-stack workload performance tests in the cloud De-risk your migration plans by analyzing targeted applications and infrastructure dependenciesCompute storage cost while augment...
Add Favorite
DevSecOps in a Mission-Critical Environment
The Joint Strike Fighter (JSF) Program is the Department of Defense's focal point for defining next-generation strike aircraft weapon systems for the Navy, Air Force, Marines, and our allies. As the operational tempo has evolved, the requirements of the fleet have the need to develop a new approach to software development and sustainment. This approach is Software Modernization, an effective hybrid of development and sustainment that involves...
Add Favorite
How to Deliver NIAP Compliant Mobile Ap...
The National Institute of Standards and Technology has partnered with the Department of Defense and several federal agencies to create a standardized mobile app vetting process for the National Information Assurance Partnership (NIAP) compliance. In 2019, NowSecure partnered with the U.S. Air Force to kick off the creation of an automated software security testing solution to enable NIAP compliance for mobile apps. This is an easy-to-use solut...
Add Favorite
Reducing Teleworking Risks with a Softw...
Secure access is not a new challenge for IT operations, but with the accelerated shift to working from home, the need to rapidly scale secure remote access has skyrocketed. The most promising security approaches in place today, like the Cloud Security Alliance's Software Defined Perimeter (SDP) approach, had their start from government approaches. In SDP environments, government data is being accessed more by unmanaged, risky, and potentially...
Add Favorite
Maintain The Integrity Of Election Systems
In 2019, $425 million were given states due to an ongoing threat to the security of our elections. The Federal Election Commission is looking for ways to secure our national election infrastructure and improve the election administration. Palo Alto Networks helps to ensure the security of our elections and the systems that support our voting process. Our automated tools perform baseline network security posture audits of existing users, applic...
Add Favorite
Back to Search Begin New Search