Three Keys to Fulfill New Cybersecurity...
Join AWS, Wickr, Presidio Federal and Carahsoft to explore how together we can help your agency meet fulfill these requirements with ease – from creating a plan to accelerate cloud adoption, building architectures with a zero-trust security model, and increasing your overall environments visibility for security and compliance purposes. You will walk away with invaluable knowledge on how to: Adopt easy to use, secure multi-factor authoriz...
Anatomy of an Attack
Dissect the anatomy of recent attacks observed by one of Palo Alto Networks leading managed security service providers. Join Norlem's Vice President of Engineering to learn the latest tools and techniques being used in successful breaches, as he detonates malware and delivers an articulation of each step in the attack sequence. Norlem will then present how organizations are leveraging tools from Palo Alto Networks Cortex XDR to successfully pr...
Ransomware Protection: Reducing the Imp...
There is no shortage of options to consider for improving your organization's security posture. As novel ransomware techniques continue to proliferate, choosing the most effective project to prioritize is critical. Choosing correctly means weighing the efficacy, effort, and cost to determine which has the highest value in buying down ransomware risk.Join us as Garrett Weber, Director of Solutions Engineering at Akamai (previously at Guardicore...
DevSecOps for Public Sector: A Roadmap...
Join CloudBees and Carahsoft during the DevSecOps for Public Sector event series to learn more about enabling faster software delivery and development, without sacrificing security and compliance! CloudBees prioritizes security and compliance by applying DevOps principles to the software supply chain through a three-pronged concept: secure in development, delivery, and production. Register now and join our CloudBees virtual speaking session to...
DevSecOps for Public Sector: A Roadmap...
Join Elastic and Carahsoft during our DevSecOps for Public Sector event to learn about the value of the Elastic Stack and how it can be integrated into every segment of the DevSecOps continuum to provide full visibility into activity at all levels. Elastic builds real-time, scalable and enterprise search, observability and security solutions into a single technology stack that can be deployed anywhere. Register now for the Elastic virtual spea...
DevSecOps for Public Sector: A Roadmap...
Join CyberRes (a Micro Focus line of business) during the DevSecOps for Public Sector event to learn how to navigate the changing threat landscape by building both cyber and business resiliency. During this session we will be joined by Stan Wisseman, Chief Security Strategist at Micro Focus who will share insight on how their Fortify technology: Provides a flexible end-to-end Application Security solution with on-premises, on-demand, hosted, a...
DevSecOps for Public Sector: A Roadmap...
Join Copado and Carahsoft during the DevSecOps for Public Sector event to learn how combining integration technologies, agile delivery techniques, and cloud-native platforms improve the speed and security of software delivery for agile integration. Copado is the leading DevOps and testing solution for low-code SaaS platforms that run the world's largest digital transformations. With rapid time-to-market and short feedback cycles across their r...
Cloud Delivered Network Security with P...
Existing networking and network security architectures no longer meet the needs of enterprises in the new world of hybrid work. It's time for a new approach, the Secure Access Service Edge (SASE). However, to be effective, a successful SASE strategy must converge best-of-breed SD-WAN and security capabilities in the cloud to deliver exceptional user experiences while reducing security risk. During this webinar, we will explore how three key th...
Finding Apache Log4j Vulnerabilities In...
Log4Shell, an internet vulnerability that affects millions of computers, involves an obscure but nearly ubiquitous piece of software, Log4j. The software is used to record all manner of activities that go on under the hood in a wide range of computer systems. Jen Easterly, Director of CISA, called Log4Shell the most serious vulnerability she's seen in her career. There have already been hundreds of thousands, perhaps millions, of attempts to e...
Boosting Your Zero Trust Security Postu...
Most solutions to security problems take a siloed approach. The problem is ransomware is capable of interacting with all parts of your IT environment, so focusing efforts on just one part of it will have diminishing returns. Dealing with ransomware demands a holistic approach. Zscaler 'Active Defense' and Deception technology helps agencies defend against ransomware by: Sending early warning for pre-breach attacks Creating a fake attack surfac...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.