Back to Search Begin New Search Save Search Auto-Notify
Focus on What Matters Most With Trusted...
As threat actors continue to probe for weak points and develop new ways to penetrate or circumvent traditional IT defenses, forward-thinking cybersecurity experts have expanded their intelligence programs to cut through the noise and disrupt threats before they impact the business. Optimized for both user and technology workflows, intelligence from Recorded Future provides real-time context on who is attacking, their motivations and capabilit...
Add Favorite
Avoiding Log4j Vulnerabilities: Securin...
Most of today's government organizations operate using proprietary or "first-party" software. These proprietary applications (ie. GOTS tools) present a challenge as they receive limited support from off-the-shelf security platforms, which leaves organizations more vulnerable to hidden vulnerabilities within their custom solutions. Join Qualys on November 29th for a live webinar where you will learn: How enhancements will allow customers to cre...
Add Favorite
Empowering Agencies with DEI PRO: Mobil...
Join ADF Solutions for an exclusive webinar with Arina as they explore how ADF’s cutting-edge digital software helps solve cases faster. In this session, they will delve into how DEI PRO streamlines investigations, enhances evidence analysis, and equips agencies with the resources they need to adapt to the ever-evolving challenges of digital forensics. Explore its advanced features, including: Instant Mobile Preview Screenshots and Scree...
Add Favorite
360-Degree View of Student Success: Hig...
Historically, higher education institutions and state agencies have struggled to capture, understand, and report student data due to siloed disparate systems and the lack of a centralized data platform. This webinar with Alteryx and Avaap taught attendees how a longitudinal, 360-degree data mart is a one-stop-shop for simplified, repeatable, comprehensive, and advanced analysis of students with near real-time data feeds, helping institutions a...
Add Favorite
Ready for 2024: How Coordinated Vulnera...
With the 2024 election right around the corner, security and integrity are on your constituents’ minds. HackerOne convened a panel of cybersecurity and election integrity subject-matter experts to give leaders insight into new best practices in coordinated vulnerability disclosure (CVD). During this webinar, we reviewed the success of a recent hacker challenge conducted by the Election Security Research Forum and leading voting technolog...
Add Favorite
Zoom Trainings - November 2023
You're invited to attend our Zoom Training session! You will have the opportunity to meet with one of our Zoom specialists to teach you everything you need to know to utilize your Zoom account to its full capabilities. Take the time to ask us questions, inform us about your requirements, and discover more about how Zoom can help both you and your organization. Learn more about the variety of tools offered by Zoom including: Account customi...
Add Favorite
Learn about Microsoft Sentinel DoD Zero...
According to the Microsoft Digital Defense Report of 2022, the United States government network is the target of nearly half of global nation-state attacks? The US Department of Defense released its initial Zero Trust reference architecture in 2022.The latest update provides crucial details for implementing the Zero Trust strategy, including clear guidance of 45 separate capabilities and 152 activities needed to adopt a consistent approach. Jo...
Add Favorite
CTO Sessions: A Guide to BYOK and HYOK...
Cloud Security Alliance best practices require that keys be stored and managed outside of the cloud service provider and the associated encryption operations. Cloud Service Providers therefore offer Bring Your Own Key (BYOK) or Hold Your Own Key (HYOK) services to enable customer control of the keys used to encrypt their data. Customer control of the keys allows for the separation, creation, ownership and control, including revocation, of encr...
Add Favorite
Harnessing Observability: Illuminating...
Dynatrace hosted a virtual event the week before DoDIIS 2023 to explore how enhanced observability is enabling government teams effectively manage and understand their complex IT environments, transforming chaos into clarity.Dynatrace provides agencies with precise answers via intelligent automation and the solutions needed to accomplish the objectives of a Zero Trust architecture with AI-enabled continuous observability, analytics, automation...
Add Favorite
Prioritize Mission Delivery and Constit...
In today's landscape, delivering on promises to your constituents and strengthening their trust in your agency or organization is key to your mission. In this archived webinar, attendees learned how to protect the Salesforce data that drives your mission. Attendees of this on-demand webinar will explore: Mission delivery Continuity Security
Add Favorite
Back to Search Begin New Search