84 webcasts found
+ 125 past events found
Back to Search Begin New Search Save Search Auto-Notify
Cybersecurity, Ransomware, and the Clou...
Sharing data in the cloud offers a huge advantage for educators to easily offer faculty and students the ability to work and study wherever they are. It also helps the IT Operations team to simplify management and costs for infrastructure, data storage, and data protection. But you may have questions as you determine your cloud strategy. How secure is the cloud? Is all your data automatically protected in the cloud? What happens when ransomwar...
Add Favorite
Human Reporting + AI to Protect Your Ag...
Use Human Reporting + AI to Protect Your Agency from a Breach You don’t have to look far to find a headline about a recent breach or compromise within the public sector, and as reported in the 2021 Verizon Data Breach Investigations Report, not only is the public sector the second most victimized industry when it comes to cyberattacks, but phishing was behind 70% of government breaches. As threat actors continue to innovate their approac...
Add Favorite
Security on the Seas Webinar Series: IT...
This year's Security on the Seas Webinar Series: IT Solutions for Naval Operations will have a special feature from Salesforce. This event will emphasize endpoint security, zero trusts, mobility, and multi-cloud. Join us as we bring together government IT and industry leaders for dynamic discussions around emerging systems and leading-edge technology for the future of Naval operations. Want to learn more before attending this webinar? Check ou...
Add Favorite
Collibra Data Intelligence in the Cloud...
As government agencies continue to modernize and innovate to achieve mission with AI and ML technologies and using data, Collibra empowers them to have trusted data assets to drive strategic insights. Government agencies around the world trust Collibra to meet standards of privacy, reliability, and compliance. Join our security and cloud experts for this session of our webinar series, where attendees will: Learn about the Collibra FedRAMP envi...
Add Favorite
Private Access: Learn How to Eliminate...
It's important to understand the difference between private access provided by a platform supporting Zero Trust principles and access delivered through Virtual Private Networks, or VPNs. Although both private access to private resources, the way users are granted access to those resources via iboss Private Access is drastically different. The iboss Private Access service inverts the VPN model completely. Instead of granting a user access to pr...
Add Favorite
Zscaler CMMC Webinar Series
The DOD’s Cybersecurity Maturity Model Certification, or CMMC is designed to protect its Supply Chain partners from cyber-attacks. CMMC will require any company providing a product or service to the DOD, directly, or indirectly, to achieve CMMC certification by 2025, with some contracts already calling out CMMC as a requirement. This will impact roughly 300,000 companies and over $400B of DOD contract awards annually. Join Zscaler on Jul...
Add Favorite
Zero Trust Security for Agencies
Zero Trust is an evolution of a range of past security architectural approaches and concepts; think network segmentation, least privilege, and defense. The key difference being Zero Trust brings a different mindset to how we design and build security to support the idea of starting with no implicit trust and that we assume a breach has already occurred. The Department of Defense (DOD) released a publication in the Spring of 2021 on Zero Trust...
Add Favorite
Digital Documents for Online Security a...
Delivering modern, efficient, and engaging digital experiences is critical to advancing your agency's mission. Adobe Acrobat Document Cloud (DC) was built to be flexible, providing tools that empower collaboration while you're working remotely — so you can easily integrate it into your existing IT systems and scale it to your future needs! Join our complimentary webinar to discover how your agency can replace paper processes with digital...
Add Favorite
Building an Effective Identity and Data...
79 percent of organizations have experienced an identity-related security breach in the last two years and the number of breaches continues to rise. With the exponential growth in unstructured data each year, coupled with cloud adoption and IoT devices, it is critical that organizations address their Identity and Data Management (IDM) program. So where is the best place to start? Having a foundational understanding of the current state of Iden...
Add Favorite
Email: The Most Significant Threat to Y...
Email remains a significant security threat for organizations because cybercriminals continue to favor email to distribute malware, phishing scams, and spam. Why? Because it works. Email can easily be copied to appear legitimate, and it gets delivered to the end-user, wanted or not. Join Trustwave on Tuesday, July 27th, to hear their Sr. Product Manager unpack the Trustwave 2021 Email Threat Report. You'll have the opportunity to learn about:...
Add Favorite
Back to Search Begin New Search