Back to Search Begin New Search Save Search Auto-Notify
Modernizing Mission Access (CEU Approved)
Join us for a special webinar series hosted by SIGNAL Media and Everfox. Submit one registration and gain access to up to four sessions covering topics ranging from modernizing mission access to best practices for government AI adoption, mitigating insider risk and more. First up in the series: Modernizing Mission Access. Approved for 1 GIAC CPE and 1 CompTIA CEU for A+, DataSys+, Network+, Security+, Linux+ and Cloud+. Modern missions require...
Add Favorite
Embracing A Data-Driven Approach To Cyb...
Understanding what devices exist in your environment is the foundation to security. Identify compliance gaps and risks for all IP connected assets regardless of if they are managed or unmanaged. Where are you today with your Asset Management mission? Allow Armis to provide you real-time visibility and control over every asset connected to your network. The overview of the platform focused on:Discovering and managing an accurate, unified and co...
Add Favorite
Protecting Sensitive SAP Data with Dyna...
Attendees joined Pathlock experts Jordan Tunks and Rajesh Rengarethinam to discuss:Implementing dynamic data masking controls to protect sensitive SAP data against exploit by internal and external threatsBest practices for using Attribute-Based Access Controls (ABAC) and Dynamic Data Masking to safeguard sensitive SAP data Real-world use cases highlighting how Dynamic Data Masking and ABAC secure sensitive SAP data and govern user accessHow th...
Add Favorite
Generative AI: Uses and Abuses in Cyber...
As organizations around the globe grapple with the implications of Generative AI (GAI) in cybersecurity, we recognize the importance of understanding its true impact and potential vulnerabilities. With the rise of GAI in both legitimate and malicious contexts, it is crucial to discern between hype and reality. This webinar, hosted by Trend Micro and Carahsoft, explored the nuances of GAI, particularly focusing on its utilization by threat acto...
Add Favorite
Maximize Security Detection with CrowdS...
CrowdStrike | Mimecast State, Local and Education webinar was on June 11th. During this webinar, Omar Cordova, Senior Sales Engineer at Mimecast, and Josh Radlein, Solutions Architect at CrowdStrike discussed how you can help secure your customer’s environments from sophisticated, targeted threats.In the current cybersecurity climate, organizations need to protect themselves from the increasing volume and impact of ransomware, impersonat...
Add Favorite
Tableau Server to Cloud: Lift & Shift v...
Is your on-premise Tableau Server hindering your data analysis capabilities?TTableau cloud beckons with faster analytics, scalability, security and simplified management, but migrating your entire Tableau environment can feel daunting. This upcoming webinar cuts through the confusion, unpacking the two main migration approaches viz: Lift & Shift and Tool-based migration. Attendees of this webinar joined Joseph Bernardo, Vice President of D...
Add Favorite
Trellis Data's Secure Speech: Secure Tr...
In the age of AI, government agencies need an accurate, efficient, and flexible speech-to-text service customizable for specific use cases, languages, dialects, and environments while maintaining full data custody. Attendees discovered Trellis Secure Speech's powerful user features including keyword searching, real-time alerts, dynamic speaker ID, language identification, and translation between multiple languages. Additionally, attendees lear...
Add Favorite
Take home the GOLD with Veeam Data Protection
Join us for an interactive LEGO experience with Jeff Reichard, Vice President Solution Strategy at Veeam who showed Veeam's latest integrations allowing you to combine secure data protection with your existing security toolset and Adam Ward, LEGO extraordinaire, who simultaneously guided us through the assembly of an Olympics-themed LEGO model to inspire your data security efforts.
Add Favorite
Empowering IT with NinjaOne
IT leaders in the Public Sector face unique challenges in supporting their endpoints and end-users. By choosing and leveraging the right tools effectively, they can streamline endpoint management, reduce costs, improve services, and free up time for strategic IT projects, enhancing overall operational efficiency.NinjaOne is the leading unified IT management platform that simplifies IT workflows thanks to powerful automation capabilities. In ad...
Add Favorite
Using AI to Prevent Data Loss and Email...
A comprehensive approach to stopping sensitive data loss combines a traditional rules-based approach with behavioral AI. Organizations face substantial security risks from misdirected emails and data exfiltration, leading to increased labor costs for investigations, regulatory reporting, and compliance communications. As a key conduit for sensitive data, email can expose businesses to regulatory fines, reputational damage, and customer loss. T...
Add Favorite
Back to Search Begin New Search