106 webcasts found
+ 351 past events found
Back to Search Begin New Search Save Search Auto-Notify
Malice, Misuse, & Mistakes: How Organiz...
View this on-demand webinar with Privileged Access Management (PAM) experts from Saviynt as they share best practices and anecdotes from their 20 years of experience in the PAM space. They also demonstrate how Saviynt’s Cloud PAM solution can help mitigate the risks of mistakes, misuse, and malice with just-in-time, seamless, identity-driven privileged access management. During this on-demand webinar, you'll have the opportunity to find...
Add Favorite
Tap into DHS Cyber Grants Funding to St...
The Biden Administration recently issued a statement warning of potential cyberattacks against U.S. organizations, as tensions rise between Russia and the rest of the world. Potential attacks to state and local critical infrastructure would disrupt the lives of millions of Americans, affecting lifeline services such as power, water, healthcare services, and supply chains. State, tribal and municipal government organizations need clear visibili...
Add Favorite
BeyondTrust FSI Roundtable Webinar
The Office of Management and Budget issued its guidance in January on meeting the requirements for agency networks to implement a Zero Trust architecture strategy. The mandate seeks to defend against sophisticated penetrations by adversaries, emphasizing identity management and access controls are key components of the strategies. Taken together, identity and access controls mean that privileged access management (PAM) is essential. Federal ag...
Add Favorite
2022 Red Hat Security Symposium On Demand
Join our on-demand Security Symposium webinar series, where IT security professionals can learn from Red Hat® and Intel security experts, partners, and peers to solve security issues together as a community. This Security Symposium is an on-demand, six-session webinar series with presentations from experts discussing hybrid cloud security challenges that organizations face and solutions to tackle these challenges. During this series, we...
Add Favorite
Ending Phishing Season: How State and L...
Phishing attacks are rising dramatically, particularly those aimed at state and local governments, with recent reports suggesting incidents have nearly doubled. Attacks have targeted a wide swath of the workforce—from revenue and tax officials to employees in elections and unemployment offices.The increased number of phishing incidents have moved beyond email to also target victims through social media, texts and other channels. Regardle...
Add Favorite
The Modern Government: Keyed in on Climate
Central to today’s Modern Government is a focus on building resilience and transformation. As climate change is increasingly seen as a significant risk to the management of infrastructure and the delivery of services, it is also seen, by some, as an opportunity to invest in more sustainable assets. Leaders are starting to focus on developing strategies and prioritizing climate goals that will transform the way we live and work, honing in...
Add Favorite
The Fundamentals of Application Securit...
As the nine time Gartner Magic Quadrant Leader, the Veracode team touched on the best practices that have assisted many of their existing customers during this four-part webinar series. Upon completion of all four parts you will be awarded a VeraTrack Education Certificate. In order to receive the certificate, you may either attend the live sessions, or view the on-demand recordings. Sessions included: Introduction to Application Security View...
Add Favorite
Introduction to Analytics with Alteryx
View our on-demand session on conducting end-to-end analysis. To start off, we unpack how Federal, State, and Local agencies are utilizing data-driven approaches to enhance their operations, including reconciliation, risk assessment, and data deduplication. View this on-demand webinar on how to apply these techniques for yourself. You will learn how to bring in and merge different sources of data, ensure data quality by conducting exploratory...
Add Favorite
Corporate Web-Based Export, Import, and...
Corporate Web-based Export, Import, and Sanctions Training on your LMS or Ours Choose the content that you need from CE’s expansive library, personalize it for your organization, configure to fit the varying training needs of your learners, and deploy throughout your global organization with state-of-the-art tracking and assessment tools. Over 120 training modules in the categories of: EXPORT COMPLIANCE IMPORT & CUSTOMS SANCTIONS COM...
Add Favorite
Content Enablers Export, Import, and Sa...
Current regulatory content and practical training scenarios in the areas of export, import, sanctions, and security pair with flexible course delivery options to offer solutions that fit the full spectrum of training needs. DOWNLOAD CATALOG HERE
Add Favorite
Back to Search Begin New Search