Back to Search Begin New Search Save Search Auto-Notify
Microsoft Office Offensive Tradecraft
View this webinar to learn more about: Recent developments such as Mark-of-the-Web Microsoft security controls including trust settings and decision flows Tactics for gaining initial access, lateral movement, and long-term persistence
Add Favorite
Enforce Least Privilege Across Every Endpoint
Almost every cyberattack today involves the exploitation of privileges. Broad privileges and entitlements greatly expand the attack surface and leave your organization extremely vulnerable to security breaches. However, a least-privilege access approach requires that users and programs receive the least amount of permission when required to complete specific tasks. Least privilege is one of the most essential security measures for organization...
Add Favorite
Modernizing Security: Simplifying Zero...
Government security teams today are under constant siege. Not only are they responsible for defending their organizations, but they are also tasked with complying with new and in-depth mandates that span Zero Trust, logging and most recently, artificial intelligence (AI). Leading agencies such as Oak Ridge National Laboratory are at the forefront of security innovation modernization. They achieve this by embracing next-generation solutions tha...
Add Favorite
Protecting Your Agency's Data in the Di...
Whether you're a seasoned database administrator or new to SAP ASE, SAP IQ, and SAP ASPE, this webinar provided valueable insights applicable to all levels of expertise. In this webinar, attendees: Gained insights into the security features in SAP ASE, SAP IQ, and ASPE Discovered products, proven strategies, and techniques that enhanced attendees security posture Engaged with Wayne Waldrup our seasoned database expert during our Q&A sessio...
Add Favorite
Charting Paths Forward: A Recap of Tabl...
This was an enlightening webinar that reflected on the insights gathered from our comprehensive 5-Part Public Safety Series and explore the evolving landscape of data analytics and AI in the public safety sector. During this webinar, attendees were able to: Delve into the key takeaways and success stories shared by presenters from each of the five webinars, featuring representatives from DetrDetroit Police Department, MN Bureau of Criminal App...
Add Favorite
Tungsten Automation and Optima Webinar
Download this Tungsten Automation and Transcend AP webinar for a hands-on session that is specifically designed for higher education institutions. Attendees delved into how automating your AP workflow can unlock significant benefits such as: Cognitive Capture (AI & ML) of Invoices: Say goodbye to manual data entry! Attendees learned how Tungsten Auomation and Transcend AP our intelligent technology automatically extracts and categorizes in...
Add Favorite
Navigating Regulatory Frameworks for Ex...
In an era where digital transformation is integral to how we do business, the significance of adhering to compliance frameworks and mitigating associated risks cannot be overstated. Organizations face the dual challenge of ensuring they are resilient against threats while also remaining compliant with an evolving landscape of regulatory requirements. Attendees joined for a strategic session that delves into the essentials of the Risk Managemen...
Add Favorite
Tableau Enablement Series Part 5: Secur...
In today's data-driven landscape, ensuring the security of your analytics environment is paramount. Join our webinar to enhance your Tableau security expertise and explore how cybersecurity principles intersect with Tableau's features to ensure secure data access for your users. During this webinar, attendees learned how to: Step up their Tableau security game: Attendees learned how to leverage Tableau's built-in features to secure their analy...
Add Favorite
Out of Sight Out of Control: Asset Inte...
Asset visibility and control is an unsolved challenge, with a huge amount of the attack surface being assets that are un-agentable or traditionally manageable. Allow Armis and Semperis to enlighten you on how organizations have huge blind spots that lead to unknown and unquantifiable cyber risk. During this complimentary webinar, attendees learned about: Examples of unmanaged and IoT devices that can’t be protected by traditional systems...
Add Favorite
The Evolution of ATO and Workflows that...
Keeping in line with the Agile manifesto, Secure Development of software within the Government Tech community is improving as we gain direct experience through the process of its development. Secure Development Lifecycles, the addition of "Sec" to form DevSecOps and the molding of traditional Authority to Operate (ATO) to the application of modern continuous integration/continuous delivery operations has birthed a GovTech community pushing the...
Add Favorite
Back to Search Begin New Search