Back to Search Begin New Search Save Search Auto-Notify
Accelerating Your Zero Trust Architectu...
Join us for an exclusive Splunk webinar where we will provide an overview of the Zero Trust Framework and how you can leverage Splunk as a key component to your Zero Trust Architecture. Our experts will showcase the features, benefits, and capabilities of Splunk that will help you improve your organization’s security posture and accelerate your Zero Trust Architecture. During this webinar, attendees will: Gain a comprehensive understandi...
Add Favorite
ThreatConnect: Threat Intelligence Webinar
During this webinar, attendees learned to understand the complexity of defending an increasingly diverse attack surface against increasingly diverse cyber threats. Also during this exclusive webinar, attendees learned what they should prioritize to make a material impact on their cybersecurity resiliency. During this on-demand webinar, our attendees learned: Details and logistics about DHS' State and Local Cybersecurity Grant Program to bolste...
Add Favorite
Optimizing Cyber Insurance: The Importa...
The cyber insurance landscape is evolving rapidly, driven by a surge in claims, particularly within the education sector. Active adversaries specializing in ransomware attacks are increasingly targeting educational institutions. In fact, in the U.S., 56% of K-12 and 68% of Higher Ed experienced significant impacts from ransomware in the last year. Even though most institutions already have some cyber insurance, they're discovering that the cyb...
Add Favorite
Aconex for Defense: Project Collaborati...
Oracle Aconex for Defense is a robust collaboration and information management solution that powers defense programs for successful delivery. Connect your teams and processes across the project lifecycle to drive performance and create a complete project record, all with military-grade security. With Aconex for Defense, your agency will receive workflow automation to maintain project momentum, BIM and mobile access to reduce risk and prevent r...
Add Favorite
Optimizing Threat Detection and Respons...
In recent, The White House issued a National Security Memorandum (NSM-8) specifying how the defense, national security and intelligence community are to bring their national security systems (NSS) into compliance with the Executive Order 14028 on improving cybersecurity across the federal government. Attendees joined Elastic experts for a comprehensive overview of the Elastic platform's robust cybersecurity capabilities, focusing on compliance...
Add Favorite
Accelerating Zero Trust Through Decepti...
Subsequent to WEST 2024, Acalvio and Carahsoft explored how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies.We discussed the Active Defense proactive approach to cybersecurity, empowering organizations to predict attackers' actions, strategically set traps, and closely monitor attacker interactions. Zero Trust, a strategy and architectural principle, ensures exclusive access to...
Add Favorite
Bridging the Largest Threat Visibility...
Attendees of this webinar learned: A better understanding of the email threat landscape Ways they can leverage threat intelligence in their maturing approaches to anticipating rather than merely reacting to the threats they face Register to view this on-demand recording.
Add Favorite
Charting China's Climb as a Leading Glo...
Recorded Future and Carahsoft are excited to invite you to join us subsequent to WEST 2024 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Over the last five years, Chinese state-sponsored cyber operations have transformed, emerging as a more mature, stealthy, and coordinated threat than in previous years, exemplified by the exploitation of zero-day vulnerabilit...
Add Favorite
Deciphering CMMC 2.0 Timelines & Milestones
During this webinar, we covered the latest CMMC 2.0 timelines, delivered expert insights, and showcased advanced techniques that will empower organizations to achieve CMMC 2.0 while improving their business operations. We helped prepare businesses for a future of security, success, and unparalleled opportunities in defense contracting! In this webinar, we covered: The CMMC 2.0 Overview Navigating the Timeline Risk Management The Proactive Appr...
Add Favorite
Real-Time Decision Advantage
In the fast-paced world of modern data-driven operations, the ability to harness real-time insights at the tactical edge is critical. Whether in the fields of defense, emergency response, or critical operations, minimizing latency in order to ensure immediate access to data are not just important; they are essential for effective and efficient decision-making. During this webinar, attendees were able to: Discover the significance of real-time...
Add Favorite
Back to Search Begin New Search