Automate Evidence Collection: Manage Cy...
Is your GRC strategy enabling information security activities within your organization? Today's audit and compliance practices require time and resource-intensive information-gathering techniques that produce static and “point in time” results. Organizations can streamline information and evidence gathering by leveraging existing system data, creating objective evidence, maintaining compliance, and reducing risk. Join us for an inf...
IDS: An Unexpected Key to Accelerating...
Public sector organizations wisely invested in Intrusion Detection Systems (IDS) to meet security requirements sufficient for the perimeter-based cyber threats of the time. However, today’s threat landscape is growing more complex and nefarious. As the urgency grows to combat modern advanced threats by adopting a Zero Trust security framework, public sector security teams find that standalone legacy IDS comes up short. Others may not yet...
Addressing Cloud Security Vulnerabiliti...
Please join Orca Security and Carahsoft for an informative session on cloud security vulnerabilities in the education sector hosted by Devin Crear, Sr. Cloud Security Representative, Orca Security, and Patrick Burke, Sales Engineer, Orca Security. Educational institutions continue to be the highest victimized sector even when compared to healthcare technology, financial services, and manufacturing. A recent study in the education sector found...
Section 508 Compliance: Innovative Stra...
In the digital era, Section 508 compliance is not only a regulatory necessity but a positive commitment. For federal agencies and government institutions, upholding the highest standards of web accessibility is key. Join Equally AI in this informative session as they dive into Section 508 compliance and discuss how their ChatGPT-powered product can enhance the digital experience you provide to the public. Introducing Flowy, a revolutionary pr...
Protecting Critical Infrastructure
When most people think about connected devices, they think smartphones or tablets, but that's just the tip of the iceberg. All kinds of smart devices and sensors are connected to your network. Protecting your network isn't easy, but it's made more challenging when you don't have visibility into an increasing number of unmanaged sensors and IoT devices. Gigamon and Armis want to help eliminate your blind spots with Gigamon Visibility and Analy...
The Fundamentals of Application Securit...
As the nine time Gartner Magic Quadrant Leader, the Veracode team will touch on the best practices that have assisted many of their existing customers during this four-part webinar series. Upon completion of all four parts, you will be awarded a VeraTrack Education Certificate. In order to receive the certificate, you may either attend the live sessions, or view the on-demand recordings. View the full agenda and register for all four sessions...
CX Reimagined: How SMS Fosters Citizen...
Digitizing government services provides a unique opportunity to engage and serve the public. Prioritizing multi-channel outreach strategies has helped agencies to better engage with their vast audiences and underserved communities. Building an inclusive, transparent government starts with strategic communications that reach people where they are most. Governments benefit from creating thoughtful interactions that provide updates to enhance the...
Cloud Success for Higher Ed Institution...
You and your Higher Ed team are invited for a webinar: Cloud Success for Higher Ed Institutions with HashiCorp Vault. On October 18th, Higher Ed institution professionals and industry experts host a webinar to discuss how HashiCorp Vault can update your cloud operating model and deliver new value to your students and faculty. Register now for insights on: Accelerating transitions: Education institutions must accelerate transitions to the cloud...
Data Governance: Best Practices for Get...
Your one-stop-shop for a better understanding of data governance is here. Join Bobbi Caggianelli,Manager, Sales Engineering, at Collibra, as she outlines the need for data governance, how you can get started, and shares her first-hand experiences building a data governance program from scratch at a leading financial organization. Attendees of this webinar will learn: The need for Data Governance Where to start Culture change Collibra accelerat...
Brand Protection and Enhanced Email Sec...
Anyone involved in email security today is likely familiar with the Domain-based Message Authentication Reporting and Conformance (DMARC) standard and its role in helping to secure email from threats like spam, phishing and email spoofing. But what is DMARC exactly, and how does it add another layer of security to business email systems? Register now to join Brad Allen, Sales Engineer at Mimecast, to learn: How to gain insight and control ove...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.