Bridging the Largest Threat Visibility...
Attendees of this webinar learned: A better understanding of the email threat landscape Ways they can leverage threat intelligence in their maturing approaches to anticipating rather than merely reacting to the threats they face Register to view this on-demand recording.
Future-Proofing Aerospace & Satellite C...
Amid a backdrop of escalating cyber threats within the aerospace & satellite (A&S) industry, and with federal agencies like the U.S. Space Force, NASA, and the Intelligence Community deepening ties within the supply chain, cybersecurity compliance has emerged as a linchpin for success. As the Space Force unveils its largest budget yet at $30 billion for FY24, the urgency for A&S vendors to align with federal cybersecurity standards...
Creating a Virtual Learning Environment...
In the ever-evolving realm of virtual training, crafting an immersive and enduring learning experience necessitates a nuanced strategy coupled with the utilization of cutting-edge tools. As technology continues to reshape the way we engage with education and professional development, the significance of adapting to these changes becomes paramount. Watch our on-demand webinar where Erika Jacobs, a distinguished USMC Instructional Specialist, wi...
Tableau 2024 Kick-off Webinar
This webinar gave attendees the opportunity to grow and enrich their data skills by connecting with their Tableau Team and fellow Tableau Users. Attendees were able to learn what’s new with Tableau and events to look forward to in the coming months. During this on-demand webinar, attendees were able to: Learn & grow - Discover the new features of Tableau 2023.3 and learn how those new features can take reporting to the next level Be...
Future-Proofing Aerospace & Satellite C...
Amid a backdrop of escalating cyber threats within the aerospace & satellite (A&S) industry, and with federal agencies like the U.S. Space Force, NASA, and the Intelligence Community deepening ties within the supply chain, cybersecurity compliance has emerged as a linchpin for success. As the Space Force unveils its largest budget yet at $30 billion for FY24, the urgency for A&S vendors to align with federal cybersecurity standards...
Adopting Least Privilege Principles to...
Endpoint security serves as the frontline defense in protecting your organization's network from a wide array of threats originating from devices that connect to the enterprise network, such as laptops, smartphones, and tablets. These endpoints are often the targets of cyberattacks as they provide access points to the organizational network, making them vulnerable to malware, ransomware, phishing, and other sophisticated attacks. By securing t...
F5 Distributed Cloud Webinar: F5 Federa...
Federal agencies face many challenges in the form of security-related mandates and moving applications to the cloud, such as FIPS and OMB M-21-31. As these requirements become reality, administrators addressing these technical hurdles increasingly find themselves augmenting cybersecurity and application delivery tools leading to tool sprawl. During this on-demand webinar, attendees learned how F5 can help address these requirements while prov...
Mastering Data and File Sharing at the Edge
In this webinar, we discussed how to:Master safeguarding data integrity, privacy, and security in a decentralized data landscape.Establish cyber-resilient edge infrastructures to combat rapid data generation and device proliferation effectively.Discover a file system that enables global, real-time, secure data access, fostering efficient collaboration among mission stakeholders.Leverage a global file system for enhanced cyber resilience and se...
Tame Your Agency's Data Chaos
During this webinar SAP NS2 went over how modernizing data platforms is essential for agencies. By providing your agency with up-to-date infrastructure and solutions, you enable it to consistently deliver the comprehensive insights necessary for mission success. Join SAP NS2 as they support you and your agency throughout the modernization process. During this on-demand webinar, our expert speaker covered: Migrating from legacy operating system...
Year of the Dragon? Using OSINT for a D...
Understanding and tracking the multifaceted influence of nations is crucial for maintaining a strategic advantage. China is systematically influencing instruments of national power, encompassing diplomatic, information, military, and economic (DIME) spheres. Against the backdrop of the year of the dragon — symbolizing strength, wisdom, and transformation — this program will delve into how open-source intelligence (OSINT) can empowe...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.