414 webcasts found
+ 7510 past events found
Back to Search Begin New Search Save Search Auto-Notify
Generative AI: Uses and Abuses in Cyber...
As organizations around the globe grapple with the implications of Generative AI (GAI) in cybersecurity, we recognize the importance of understanding its true impact and potential vulnerabilities. With the rise of GAI in both legitimate and malicious contexts, it is crucial to discern between hype and reality. This webinar, hosted by Trend Micro and Carahsoft, explored the nuances of GAI, particularly focusing on its utilization by threat acto...
Add Favorite
Maximize Security Detection with CrowdS...
CrowdStrike | Mimecast State, Local and Education webinar was on June 11th. During this webinar, Omar Cordova, Senior Sales Engineer at Mimecast, and Josh Radlein, Solutions Architect at CrowdStrike discussed how you can help secure your customer’s environments from sophisticated, targeted threats.In the current cybersecurity climate, organizations need to protect themselves from the increasing volume and impact of ransomware, impersonat...
Add Favorite
Transforming State and Local Government...
RiskRecon & Carahsoft hosted an illuminating webinar that went beyond theory and equipped attendees with practical tools and knowledge to revolutionize third-party cyber risk management.
Add Favorite
Piercing the Near-Peer Cyber Perimeter:...
In today's world, protecting national security requires understanding the global cyber operations landscape, particularly the activities of Great Powers countries. SpyCloud's Identity Intelligence offers a unique perspective into this challenging space, helping to uncover the tactics and trends used by advanced actors. This event showcased an in-depth analysis of compromised data, revealing connections beyond traditional near-peer threats.Acce...
Add Favorite
Bridging Zero Trust and Insider Risk Ma...
As federal agencies adhere to the Zero Trust mandate, the incorporation of insider risk management within its framework is imperative. This fusion is particularly critical amidst today's evolving threat landscape, as the federal government bolsters its cybersecurity posture. This webinar explored the intricate and powerful combination of Zero Trust and insider risk management! During the session, our speakers:Identified challenges and solution...
Add Favorite
Take home the GOLD with Veeam Data Protection
Join us for an interactive LEGO experience with Jeff Reichard, Vice President Solution Strategy at Veeam who showed Veeam's latest integrations allowing you to combine secure data protection with your existing security toolset and Adam Ward, LEGO extraordinaire, who simultaneously guided us through the assembly of an Olympics-themed LEGO model to inspire your data security efforts.
Add Favorite
Defend Smarter: Leveraging AI to Maximi...
Are you struggling to keep up with ever increasing security compliance and regulatory requirements? Is your team tired of manually intensive and labor some work for keeping up compliance efforts? Unlock the potential of automated and continuous security compliance and risk management to fortify your organization's defenses. Attendees joined us to learn more about:Regulations and industry standards driving cybersecurity efforts in the public se...
Add Favorite
How AI is Revolutionizing Government Co...
Regscale and Carahsoft joined forces in the lead up to TechNet Cyber 2024 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. As the landscape of government regulatory compliance evolves at an unprecedented pace, navigating the labyrinth of regulations while maintaining operational efficiencies has become increasingly daunting. Staying ahead of the curve is no longe...
Add Favorite
Why MDR Requires a Holistic, Cost-Effic...
Splunk is a leader in security and observability, with customers of all shape and sizes that leverage flexible sizing models, free toolkits, and best-in-class network monitoring data management. Attendees joined us to gain insights into:The growing threat landscape for school districts and municipalitiesCritical factors to consider when choosing an MDR solution providerExtracting deeper security value from your systems and security log dataDev...
Add Favorite
Unmasking Cyber Shadows: Enhancing Cybe...
Meet a powerful ally in the world of Cybersecurity: Constella Intelligence's Deep OSINT investigations fueled by AI, it taps into the world's largest breach data lake collected from the surface, deep and dark web.Join us to learn how agencies can leverage deep OSINT to:Disrupt crime at its source by uncovering synthetic Identities Conduct cybercriminal identify graphing to unveil threat actors at the individual level Achieve greater scalabilit...
Add Favorite
Back to Search Begin New Search