Debunking False Claims on the Cyber Bat...
Following the tragic events in the Middle East in October, a spectrum of cyber actors turned to social media to express their sentiment surrounding the crisis. Shortly thereafter, hacktivists joined the fray, engaging in defacements and Distributed Denial of Service (DDoS) attacks on various nation-state websites. While many of these claims were legitimate, others were later debunked, underscoring the importance of verification and validation...
Security and Compliance in 2024: Trends...
A content management system (CMS) is a key piece of the foundation for building modern digital experiences that span farther than just your website today. Global brands such as Mars, Stanley, Black & Decker, NASA and many more have trusted Drupal as their CMS to power their brand differentiating experiences. However, with a rise in cyber attacks, the security of your digital platform is critical. Join us for an insightful conversation with...
Get Started with Digital Verifiable Cre...
Thank you for your interest in our webinar. Attendees of this on-demand webinar: Were given an overview of digital verifiable credentials, including relevant national standards Learned how an enterprise IT platform easily integrated with existing government agency systems can be used to issue more secure, portable and user friendly government issued permits and licenses than traditional paper approaches Learned how digital verifiable credentia...
Optimizing Threat Detection and Respons...
In recent, The White House issued a National Security Memorandum (NSM-8) specifying how the defense, national security and intelligence community are to bring their national security systems (NSS) into compliance with the Executive Order 14028 on improving cybersecurity across the federal government. Attendees joined Elastic experts for a comprehensive overview of the Elastic platform's robust cybersecurity capabilities, focusing on compliance...
Elevate Transparency: Democratizing Ele...
The Board of Elections often faces limitations with transparency to the public. Current applications generate static reports, offering only a snapshot of data without the ability to illustrate real-time data before, during, and after elections. These text-based tables often require IT intervention, causing a delay in updating the citizens of their cities, counties, and states. Attendees of this webinar learned how Tableau has changed the way t...
DoDIIS Worldwide Webinar Series: Three...
The increasing sophistication of cyber threats, especially those targeting critical infrastructure, has catalyzed a national directive for enhanced cybersecurity measures, as signified by Executive Order 14028. Nation-state actors and other advanced threats are exploiting software supply chains with such efficacy that the integrity of our critical systems is at constant risk. The diverse and complex nature of the software utilized by agencies...
Modernizing Digital Experience with Con...
Content velocity is more important than ever as agencies strive to continuously deliver effective digital experiences and compelling content across a diverse landscape of devices and through multiple channels. The ability to create, find, and deliver the right digital assets, for the right context, at the right time is crucial to successfully engaging your audience. Access this on-demand webinar, Modernizing Digital Experience with Content Vel...
Hopewell Police Department Tackles Crim...
The Hopewell Virginia Police Department relies on dependable security systems for crime prevention and swift incident response, but inaccessible power and traditional infrastructure constraints were hindering their technology deployments. Webinar attendees discovered how Gridless Sentry's advanced battery and connectivity platform helped the Hopewell Police Department achieve continuous operation of their security technology with a reliable of...
Accelerating Authorization Capabilities...
Navigating the complexities of Identity, Credential, and Access Management (ICAM) can feel like a maze of acronyms – ABAC, PBAC, CBAC, oh my! Attendees joined for an insightful webinar where Bryan Rosensteel, Ping Identity's US Federal CTO, unravelled the intricacies of ICAM and shed light on fine-grained access control within a modern Zero Trust architecture. During this on-demand webinar, Bryan shared invaluable insights on: Decoding t...
Safeguard Your CI/CD Environments Again...
Government agencies handle a vast amount of sensitive data and are often targeted by sophisticated cyberattacks. Therefore, ensuring the integrity and security of CI/CD environments is crucial to preventing unauthorized access, data breaches and potential disruptions in critical systems. During this on-demand session, GitLab & AWS discussed how robust security measures in these environments can help government agencies maintain public trus...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.