Back to Search Begin New Search Save Search Auto-Notify
Anatomy of an Attack
Dissect the anatomy of recent attacks observed by one of Palo Alto Networks leading managed security service providers. Join Norlem's Vice President of Engineering to learn the latest tools and techniques being used in successful breaches, as he detonates malware and delivers an articulation of each step in the attack sequence. Norlem will then present how organizations are leveraging tools from Palo Alto Networks Cortex XDR to successfully pr...
Add Favorite
Ransomware Protection: Reducing the Imp...
There is no shortage of options to consider for improving your organization's security posture. As novel ransomware techniques continue to proliferate, choosing the most effective project to prioritize is critical. Choosing correctly means weighing the efficacy, effort, and cost to determine which has the highest value in buying down ransomware risk.Join us as Garrett Weber, Director of Solutions Engineering at Akamai (previously at Guardicore...
Add Favorite
DevSecOps for Public Sector: A Roadmap...
Join CloudBees and Carahsoft during the DevSecOps for Public Sector event series to learn more about enabling faster software delivery and development, without sacrificing security and compliance! CloudBees prioritizes security and compliance by applying DevOps principles to the software supply chain through a three-pronged concept: secure in development, delivery, and production. Register now and join our CloudBees virtual speaking session to...
Add Favorite
DevSecOps for Public Sector: A Roadmap...
Join Elastic and Carahsoft during our DevSecOps for Public Sector event to learn about the value of the Elastic Stack and how it can be integrated into every segment of the DevSecOps continuum to provide full visibility into activity at all levels. Elastic builds real-time, scalable and enterprise search, observability and security solutions into a single technology stack that can be deployed anywhere. Register now for the Elastic virtual spea...
Add Favorite
DevSecOps for Public Sector: A Roadmap...
Join CyberRes (a Micro Focus line of business) during the DevSecOps for Public Sector event to learn how to navigate the changing threat landscape by building both cyber and business resiliency. During this session we will be joined by Stan Wisseman, Chief Security Strategist at Micro Focus who will share insight on how their Fortify technology: Provides a flexible end-to-end Application Security solution with on-premises, on-demand, hosted, a...
Add Favorite
DevSecOps for Public Sector: A Roadmap...
Join Copado and Carahsoft during the DevSecOps for Public Sector event to learn how combining integration technologies, agile delivery techniques, and cloud-native platforms improve the speed and security of software delivery for agile integration. Copado is the leading DevOps and testing solution for low-code SaaS platforms that run the world's largest digital transformations. With rapid time-to-market and short feedback cycles across their r...
Add Favorite
Cloud Delivered Network Security with P...
Existing networking and network security architectures no longer meet the needs of enterprises in the new world of hybrid work. It's time for a new approach, the Secure Access Service Edge (SASE). However, to be effective, a successful SASE strategy must converge best-of-breed SD-WAN and security capabilities in the cloud to deliver exceptional user experiences while reducing security risk. During this webinar, we will explore how three key th...
Add Favorite
Boosting Your Zero Trust Security Postu...
Most solutions to security problems take a siloed approach. The problem is ransomware is capable of interacting with all parts of your IT environment, so focusing efforts on just one part of it will have diminishing returns. Dealing with ransomware demands a holistic approach. Zscaler 'Active Defense' and Deception technology helps agencies defend against ransomware by: Sending early warning for pre-breach attacks Creating a fake attack surfac...
Add Favorite
Zero-Trust Mobile Application Environment
With the pandemic, the DOD has to depend on and leverage mobility even more. This has only increased the demand and desire for more first and third party applications to be deployed. With the rush of demand comes the struggle to deploy without SOP's. NowSecure can optimize your mobile AppSec pipeline to meet that demand.With the push for these new mobile applications, many agencies have discovered there is a need for integrated continuous test...
Add Favorite
"But We've Always Done it This Way...
Join Carahsoft and Blackberry for this insightful session with Roger Sels, Vice President, Cybersecurity Solutions, BlackBerry to explore: How chaos in the field of cybersecurity has led to negative business outcomes Why spending more on cybersecurity - or having a bigger team - does not equate to increased protection New ways agencies can drive outcomes and increase security posture with measurable results
Add Favorite
Back to Search Begin New Search