Implementing Zero Trust Controls and Mo...
Cybersecurity compliance frameworks are curated with the most effective methodologies an organization can take to prevent cyberattacks and reduce the impact if one occurs. If passed in current form, NIST 800-171A Rev.3 final public draft will adopt substantial changes to existing compliance controls required by the Cybersecurity Maturity Model Certification (CMMC). All those within the Defense Industrial Base will be required to observe substa...
Embracing A Data-Driven Approach To Cyb...
Understanding what devices exist in your environment is the foundation to security. Identify compliance gaps and risks for all IP connected assets regardless of if they are managed or unmanaged. Where are you today with your Asset Management mission? Allow Armis to provide you real-time visibility and control over every asset connected to your network. The overview of the platform focused on:Discovering and managing an accurate, unified and co...
Gemini for Google Workspace: Developing...
Gemini for Google Workspace is a powerful collaborative partner that can act as an effective prompt, thought partner, source of accuracy and productivity booster—all while ensuring every user and organization has control over their data. In this session, attendees learned about:Leveraging generative AI for enhanced efficiencyPrioritizing public sector use cases for maximum impactPractical examples and best practices tailored to governmen...
From Silos to Synergy: Bringing Higher...
In the rapidly growing world of AI, organizations have a responsibility to modernize and secure their Data Solutions and trust their information is 100% reliable, auditable, and accessible. Eon Collective guides organizations to establish their sustainable solution to prepare for AI integration by leveraging standardized open-source methodologies to obtain a robust system of Business Intelligence. These methodologies align people, process, and...
Protecting Sensitive SAP Data with Dyna...
Attendees joined Pathlock experts Jordan Tunks and Rajesh Rengarethinam to discuss:Implementing dynamic data masking controls to protect sensitive SAP data against exploit by internal and external threatsBest practices for using Attribute-Based Access Controls (ABAC) and Dynamic Data Masking to safeguard sensitive SAP data Real-world use cases highlighting how Dynamic Data Masking and ABAC secure sensitive SAP data and govern user accessHow th...
Lunch Bytes Webinar Series
Instead of settling for a regular break, participants joined Dynatrace online for Lunch Bytes, a snackable series of easily digestible events covering today's leading technology topics. Participants upgraded their lunch time with Public Sector Solutions Engineer, Matt Gardner, as he shared tactical insights and practical use cases on the following topics across four 30-minute sessions.
Data Governance Demystified: From Chaos...
Embark on a journey to unravel the complexities of data governance with Tableau in our webinar. We uncover the pivotal role Tableau plays in establishing robust data governance frameworks that ensure data integrity, compliance and trustworthiness. During this webinar, attendees learned:Defining data policies to implement governance controlsPractical strategies and techniques to effectively govern a data landscapeTableau's powerful features and...
Generative AI: Uses and Abuses in Cyber...
As organizations around the globe grapple with the implications of Generative AI (GAI) in cybersecurity, we recognize the importance of understanding its true impact and potential vulnerabilities. With the rise of GAI in both legitimate and malicious contexts, it is crucial to discern between hype and reality. This webinar, hosted by Trend Micro and Carahsoft, explored the nuances of GAI, particularly focusing on its utilization by threat acto...
Maximize Security Detection with CrowdS...
CrowdStrike | Mimecast State, Local and Education webinar was on June 11th. During this webinar, Omar Cordova, Senior Sales Engineer at Mimecast, and Josh Radlein, Solutions Architect at CrowdStrike discussed how you can help secure your customer’s environments from sophisticated, targeted threats.In the current cybersecurity climate, organizations need to protect themselves from the increasing volume and impact of ransomware, impersonat...
Building Your AI/ML Business with MFGS, Inc.
Attendees joined MFGS, Inc. and Carahsoft on June 11 for an insightful webinar that delved into the evolving landscape of Artificial Intelligence and Machine Learning (AI/ML). For many agencies, AI/ML are still buzzwords and hype. Knowing which are the best of so many AI/ML solutions available for experts to recommend can be a daunting prospect. During this webinar, MFGS, Inc.:Equipped partners with a better understanding of the Micro Focus /...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.