Strong Security Starts with Strong IT O...
Splunk ITSI is a premium analytics solution that correlates and applies machine learning to infrastructure, application, and business data for 360° service monitoring, predictive analytics, and streamlined incident management.Unlike point event management or IT monitoring solutions, ITSI correlates and applies machine learning to metric, log, and trace data for end-to-end intelligence across your entire environment. ITSI also combines views a...
A New Approach to Defending Against Dai...
This webinar will cover: Use cases including: critical legacy applications, unpatched applications, and those with known and unknown vulnerabilities How to secure applications in any environment: COTS, custom, legacy, OT, hybrid, cloud, on-prem, cloud The new approach: How understanding your applications is the key to all of this and in order to secure your software while it's running, you must first understand it
CDM Endpoint Detection & Response Series
Join Palo Alto Networks to hear about Cortex XDR, the industry's first extended detection and response platform that integrates endpoint, network, cloud, and third-party data to stop sophisticated attacks. Combining the capabilities of EDR, NDR, and UBA, Cortex XDR provides full protection while simplifying operations and allows security teams to gain enterprise-wide visibility. Topics of discussion include: • Cortex XDR CDM capability ma...
Disaster Recovery: A Cloud-Based Solution
Natural disasters and other catastrophic events not only impact citizens directly, but also can disrupt the IT systems government agencies rely on to serve citizens after impact. It is critical that Federal, State and local governments respond in a timely fashion to circulate vital information and provide services to those affected, especially in an emergency. In order to do this, agencies must adopt modern solutions that support today’s...
Staying Resilient Amidst Chaos
What does it mean to be a resilient government employee? What about an authentic employee? How can we be both authentic and resilient in the chaos that is 2021? We covered these topics and more during our annual NextGen Government Training Summit this past August, and now we want to share those lessons learned with you. Join us online Tuesday, Sept. 14 from 2-2:50 p.m. ET/11-11:50 a.m. PT to learn from our experts about how to thrive in diffic...
September 14, 2021
Organizer:
GovLoop Location:
Webcast
The Official 2021 Cyber Security Summit...
To protect the health and safety of attendees, all 2021 summits have been moved to a virtual platform due to COVID-19 concerns. The Official Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. These events maintain as much of the traditional tradeshow experience as possible with a...
Blue Team Summit: SOC Solutions Track
A security operations center (SOC) act as the centralized command center for a corporation dealing with security issues on an organizational and technical level. Responsible for protecting an organization from cyber attacks, a SOC continuously monitors network infrastructure, desktops, servers, endpoint devices, IoT devices, applications, and databases, among other systems for security threats. Modern SOCs are comprised of four components moni...
Stealthbits Solar Winds Webinar
Ransomware attacks have increased 300% in the first half of 2021. Forrester estimates that 80% of security breaches involve privileged credentials! Zero Trust is a security concept incorporating a variety of solutions that have to work together in an integrated fashion. Join Stealthbits on September 9th, for a webinar on enabling Zero Trust. Stealthbits provides solutions for Data Access Governance, Active Directory Management & Security,...
FY21 (Virtual Training) Acquiring Exces...
GSA Personal Property Management is hosting a series of virtual training sessions on various aspects of the program. The topic of this FREE virtual training will be Acquiring Excess Personal Property. This training will provide you with information as to who can acquire excess personal property, whether we pay for it or not, how to acquire the property via a live demonstration and more. In addition, you will receive training as to how to imple...
Navigating the Road Ahead for Zero Trust
In earlier ATARC Zero Trust sessions, we discussed why Zero Trust is important for securing enterprise resources in a cloud and multi-cloud environment. In this panel discussion, we will dig into practical approaches to executing a Zero Trust modernization plan. Topic experts will cover how priorities and strategies have evolved in the months since the Biden Cybersecurity Executive Order. Join this webinar to hear topics such as: Assessing cur...
September 9, 2021
Organizer:
ATARC Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.