A New Approach to Defending Against Dai...
This webinar will cover: Use cases including: critical legacy applications, unpatched applications, and those with known and unknown vulnerabilities How to secure applications in any environment: COTS, custom, legacy, OT, hybrid, cloud, on-prem, cloud The new approach: How understanding your applications is the key to all of this and in order to secure your software while it's running, you must first understand it
CDM Endpoint Detection & Response Series
Join Palo Alto Networks to hear about Cortex XDR, the industry's first extended detection and response platform that integrates endpoint, network, cloud, and third-party data to stop sophisticated attacks. Combining the capabilities of EDR, NDR, and UBA, Cortex XDR provides full protection while simplifying operations and allows security teams to gain enterprise-wide visibility. Topics of discussion include: • Cortex XDR CDM capability ma...
Disaster Recovery: A Cloud-Based Solution
Natural disasters and other catastrophic events not only impact citizens directly, but also can disrupt the IT systems government agencies rely on to serve citizens after impact. It is critical that Federal, State and local governments respond in a timely fashion to circulate vital information and provide services to those affected, especially in an emergency. In order to do this, agencies must adopt modern solutions that support today’s...
Staying Resilient Amidst Chaos
What does it mean to be a resilient government employee? What about an authentic employee? How can we be both authentic and resilient in the chaos that is 2021? We covered these topics and more during our annual NextGen Government Training Summit this past August, and now we want to share those lessons learned with you. Join us online Tuesday, Sept. 14 from 2-2:50 p.m. ET/11-11:50 a.m. PT to learn from our experts about how to thrive in diffic...
September 14, 2021
Organizer:
GovLoop Location:
Webcast
The Official 2021 Cyber Security Summit...
To protect the health and safety of attendees, all 2021 summits have been moved to a virtual platform due to COVID-19 concerns. The Official Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. These events maintain as much of the traditional tradeshow experience as possible with a...
Blue Team Summit: SOC Solutions Track
A security operations center (SOC) act as the centralized command center for a corporation dealing with security issues on an organizational and technical level. Responsible for protecting an organization from cyber attacks, a SOC continuously monitors network infrastructure, desktops, servers, endpoint devices, IoT devices, applications, and databases, among other systems for security threats. Modern SOCs are comprised of four components moni...
Stealthbits Solar Winds Webinar
Ransomware attacks have increased 300% in the first half of 2021. Forrester estimates that 80% of security breaches involve privileged credentials! Zero Trust is a security concept incorporating a variety of solutions that have to work together in an integrated fashion. Join Stealthbits on September 9th, for a webinar on enabling Zero Trust. Stealthbits provides solutions for Data Access Governance, Active Directory Management & Security,...
FY21 (Virtual Training) Acquiring Exces...
GSA Personal Property Management is hosting a series of virtual training sessions on various aspects of the program. The topic of this FREE virtual training will be Acquiring Excess Personal Property. This training will provide you with information as to who can acquire excess personal property, whether we pay for it or not, how to acquire the property via a live demonstration and more. In addition, you will receive training as to how to imple...
Navigating the Road Ahead for Zero Trust
In earlier ATARC Zero Trust sessions, we discussed why Zero Trust is important for securing enterprise resources in a cloud and multi-cloud environment. In this panel discussion, we will dig into practical approaches to executing a Zero Trust modernization plan. Topic experts will cover how priorities and strategies have evolved in the months since the Biden Cybersecurity Executive Order. Join this webinar to hear topics such as: Assessing cur...
September 9, 2021
Organizer:
ATARC Location:
Webcast
End-to-End Cloud Visibility with Splunk
As public sector organizations migrate to the cloud, they face several challenges: how to keep your environment secure, how to ensure end-to-end visibility, as well as, continuity.Join us to learn how Splunk can support your organizations through the migration process. We'll walk through best practices, Splunk apps, available resources, and architecture options for each stage of your cloud migration journey. We'll also go over how Splunk Cloud...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.