Back to Search Begin New Search Save Search Auto-Notify
Tradecraft Tuesday: Using Memory Forens...
Memory Forensics is a required skill for digital analysts these days; it is also needed in order to keep up with advanced attackers. In addition to attackers avoiding disk, thousands of nodes and BYOD are increasing the complexity of investigations. The good news is that while attackers are getting more and more advanced, their code still has to be memory resident in order to run. Memory Forensics can help you recover malicious code that...
October 10, 2023
Organizer: Huntress
Location: Webcast
Add Favorite
The Missing V of Data: Veracity
The missing V of large data—volume, velocity and variety—has always been veracity. In this webinar, we'll hear from two long-time leaders who have worked on this problem. They will present how to find the 'truth' in the deluge of data, how to validate data, how to check pedigree and lineage, and how to weed out duplicates that can create false positives. Attendees will come away with the guidance and approaches that can help serve...
October 10, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
The Next Frontier in AI-powered Productivity
IT teams are always on the lookout for tools that will improve the creativity and productivity of their software development teams. Generative AI promises massive leaps in productivity due to the ability of large language models to act as AI collaborators through real-time code suggestions, chat assistance, and enhanced customization, at speed and scale. In this webinar, you’ll hear from leading marketing intelligence provider IDC on the...
October 10, 2023
Organizer: Google Cloud
Location: Webcast
Add Favorite
Surviving the Wave of Cyber Threats and...
In today's rapidly changing cyber-physical landscape, do you have all the information you need to navigate the waves of new regulations, threats, and challenges targeting industrial operations? With escalating regulatory demands and fines, as well as the immediate need to defend against, respond to, and recover from cyber threats, it's easy for OT teams to feel under water. This webinar by Industrial Defender and ARC Advisory Group will addres...
October 10, 2023
Organizer: Industrial Defender
Location: Webcast
Add Favorite
Introducing Drag and Drop Automations
Are you looking to streamline routine and repetitive tasks, increase efficiency without additional overheads, and scale your MSP without losing more time? Join CloudRadial's CEO & President, Jeff Farris, and VP of Product, Ricky Cecchini, as they take a deep dive into our new drag and drop Automations feature. Register to learn how to: Trigger RMM commands, Simplify onboardings, and Create opportunities. Don’t miss this webinar if yo...
October 10, 2023
Organizer: Cloud Radial
Location: Webcast
Add Favorite
TargetGov Meet The Experts Fraud in Fed...
The federal marketplace is unique, with a multitude of rules and regulations that companies must navigate to ensure compliance. Many companies find it challenging to discern which policies and regulations are essential for their success in the federal marketplace. In an upcoming episode of "Meet the Experts," we are pleased to have Isaias "Cy" Alba, a Partner at Piliero Mazza, share valuable insights for companies aspiring to operate within th...
October 10, 2023
Organizer: TargetGov
Location: Webcast
Add Favorite
Utilizing Zero Trust to Benefit Mission...
Zero trust, the cybersecurity posture for which every agency is working to achieve, is not an end in and of itself. It’s a strategy for the goals of mission assurance, data protection and resilience. Join us for a panel discussion with moderator, Tom Temin, and agency and industry leaders who will discuss the latest thinking in achieving mission assurance and data protection using zero trust, segmentation and monitoring strategies. Learn...
October 10, 2023
Organizer: Federal News Network
Location: Webcast
Add Favorite
The Hard Truths of Data Security in the...
The growth in volume of data being generated every year is staggering. One company has estimated that an organization’s amount of data will triple within five years, between on-premises, cloud and software-as-a-service locations. On top of that, sensitive data – whether personally identifiable information, financial, intellectual property, etc. – can be scattered throughout the data ocean. In 2022, more than 200 government ag...
October 10, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
PSHC Industry Partner Briefing: MAS Ven...
GSA’s Professional Services and Human Capital (PSHC) portfolio is committed to helping contract-holders excel in the dynamic world of government contracts. Our monthly webinars are designed with one primary goal in mind: empowering you with the knowledge and insights you need to succeed. Our webinars go beyond just information sharing. We strive to equip contract-holders with the tools and expertise required to navigate the complexities...
October 10, 2023
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
3 Strategies to Defend Your Supply Chai...
Supply chains are now prime targets for cybercriminals. Their vulnerabilities, coupled with gaps in cybersecurity measures, make supply chains attractive and easy targets. Cybercriminals exploit this situation by utilizing readily available, cost-effective and highly efficient downloadable exploit kits, such as ransomware. Executive leaders need to take proactive measures to safeguard their supply chains. This free supply chain webinar explore...
October 9, 2023
Organizer: Gartner
Location: Webcast
Add Favorite
Back to Search Begin New Search