Back to Search Begin New Search Save Search Auto-Notify
Demystifying Zero Trust for the C-Level...
Implemented correctly, a Zero Trust architecture / strategy / approach to Information Technology, and the architecture that supports it, has the potential to provide a simpler, more secure, more flexible environment for an organization to do business. The advent of Zero Trust should be regarded as an opportunity to better align IT with an organization’s business strategy. The whole purpose of modern networked computing is to facilitate c...
April 19, 2022
Organizer: Cloud Security Alliance
Location: Webcast
Add Favorite
Emulation Planning with ATT&CK
AttackIQ’s alignment to the MITRE ATT&CK® framework and our deep partnership with MITRE Engenuity’s Center for Threat-Informed Defense set us apart from the pack when it comes to adversary emulation. Through cutting-edge research informed by the best minds in cybersecurity, AttackIQ helps you achieve comprehensive cybersecurity readiness through realistic and specific adversary emulations. We bring the deepest library of MI...
April 19, 2022
Organizer: Cloud Security Alliance
Location: Webcast
Add Favorite
What is the Tactical Edge - and Other U...
Everyone has seen media reports that Russian soldiers are using personal cellphones, rather than encrypted communications, because they made the mistake of destroying 4G and 5G towers. In military terms, they find themselves operating in a “denied environment,” because they accidentally rendered their comms network inoperable.All soldiers in a combat situation are operating at the “tactical edge,” where things like limi...
April 18, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
U.S. Infrastructure Deal Impacts on Sta...
The recent U.S. Federal Bipartisan Infrastructure Deal allocated $65 billion to expand broadband in communities across the United States, with the objective of improving connectivity for rural areas, low-income populations and tribal communities. What can state and local governments do to maximize the new funding and the opportunities it offers? Join this complimentary public sector webinar as a panel of Gartner experts look at the implication...
April 18, 2022
Organizer: Gartner
Location: Webcast
Add Favorite
EC-Council Ethical Hacker Training - Wa...
The Certified Ethical Hacker certification is one of the most sought-after cybersecurity certifications around the globe. Organizations like the DoD and ANSI have endorsed and/or accredited the CEH course. Want to Master CEH? This program incorporates instruction and practice to get students ready to take the CEH certification exam as well as the CEH Practical Exam. Candidates who successfully pass both exams earn the CEH Master credential as...
April 11-15, 2022
Organizer: EC-Council
Location: Washington DC, DC
Add Favorite
Analyzing Memory Bus to Meet with DDR S...
The latest technology for serial links and memory interfaces is getting into the multi-gigabit range. We see them adopting multi-level modulations and more advanced data recovery methods. As a result creating a stable and compliant design is more challenging than ever before and standard signal integrity analysis is no longer sufficient. Keysight is offering a design flow, which gives you all the insights you need. In this webinar series, our...
April 14, 2022
Organizer: Keysight Technologies
Location: Webcast
Add Favorite
Experience the Armis Platform with a Li...
Connected devices continue to make their way into the workplace in record numbers, and the traditional IT and security tools you've relied on can't keep up.Join us for a 30-minute live demo to learn how our platform helps organizations like yours: Gain comprehensive visibility of every connected asset in your environment. Understand and reduce your attack surface by visualizing and prioritizing risks. Improve threat detection and response usin...
April 14, 2022
Organizer: Armis
Location: Webcast
Add Favorite
2022 ATARC Federal Security Breakfast Summit
As agencies look to replace legacy systems with the cloud, Zero Trust has risen as a best cybersecurity practice. Listen in as topic experts discuss the shift to a teleworking workforce and the importance behind Zero Trust security. This shift has triggered new cybersecurity strategies within the Federal Government, especially as Government agencies make the migration to the cloud. Hear from topic experts as they dive into the best practices f...
April 14, 2022
Organizer: ATARC
Location: Washington, DC
Add Favorite
Modernize Your Data Loss Prevention Str...
The rapid adoption of remote work and transition to the cloud have required many security teams to face a familiar question: are our legacy data loss prevention (DLP) solutions up to the challenge? The short answer: no, they aren’t. In fact, according to a recently released survey by the CyberRisk Alliance, few IT and cybersecurity professionals are confident in their organizations’ ability to protect data against a breach or loss....
April 14, 2022
Organizer: Proofpoint
Location: Webcast
Add Favorite
Why Storage Matters to Data and Should...
In this session, you will learn where data lives in a computer system, and the key performance metrics used to understand the health and performance of your storage subsystem. Then, we will wrap up with a real-world scenario where storage performance proved to be the bottleneck in the most mission-critical workloads. After that, we'll open it up for questions and dive into the storage topics *YOU* want to talk about either on-premises or in th...
April 14, 2022
Organizer: Pure Storage
Location: Webcast
Add Favorite
Back to Search Begin New Search