How to Automate, Orchestrate, and Secur...
Attendees of this webinar explored how BigFix leverages AI to:Improve employee experience using Gen AIAutomate infrastructure managementSecure and manage endpoints across nearly 100 operating systemsEnsure continuous complianceEnhance vulnerability management with award-winning cybersecurity analytics
Qualys TotalCloud 2.0: Cloud Native App...
In accordance with White House Executive Order 14028, CISA published the Cloud Security Technical Reference Architecture in June 2022 to provide guidance to Agencies on secure cloud services adoption to enable the adoption of Zero Trust. Attendees joined us on August 15th for an insightful webinar where Qualys executives will discuss CISA’s 2022 guidance, the evolution of cloud security, and where the future of Cloud Security is headed....
TIBCO Messaging Innovations for Digital...
In this webinar, Bobby Liao, Director of Product Management at TIBCO, discussed how TIBCOŽ Platform–Messaging:Creates the infrastructure that facilitates the real-time exchange of data between your systems, applications and componentsEnables real-time data distribution between disparate endpoints wherever they are hosted, while also being a central component of event-driven and streaming data architecturesProvides both open-source and co...
The Role of Integrity Within Zero Trust
Attendees who joined this webinar learned about:Zero trust as it applies to federal agency cybersecurityThe role integrity plays in enforcing a zero trust approachMethods for achieving integrity using file integrity monitoring (FIM) and security configuration management (SCM)
Overcoming PDF Signature Challenges in...
Electronic and digital signatures have been around for 24 years, yet implementing them securely and in an approved manner remains an issue today. In this webinar, we covered the major challenges in their implementations and provided solutions to make them a reality in your ServiceNow instance. Discover these 5 key takeaways from this webinar:What are the major challenges?What is the difference between electronic and digital signatures?How does...
Real Time Business Insights Powered by...
Join Atrium, your go-to Tableau and data strategy partner, in this webinar to discover how Tableau and Salesforce Data Cloud can revolutionize your customer understanding and drive business growth. During this webinar, attendees:Learned how Data Cloud can integrate multiple data sources for a comprehensive 360-degree view of your customersExperienced Tableau and Data Cloud in action as they transform data into actionable insightsGained an unde...
A New Paradigm for Managing Third-Party...
The MOVEit and GoAnywhere attacks in 2023 ushered to the forefront the importance of having a viable and adaptive third-party risk strategy. If there had ever been the feeling that third-party risk was a secondary stakeholder in the cybersecurity space, the importance of which was elevated only for short periods of time during a crisis, these two attacks shattered that notion entirely. This new reality has compelled security strategists to rap...
OSINT Webinar Series: Following the FIght
During this webinar Babel Street delved into the power of Open-Source Intelligence (OSINT) by deciphering the complexities of the war in Ukraine. Attendees explored how publicly available information can shed light on:OSINT in Action: Unveiling the war's realities through the analysis of open-source information.Beyond Ukraine: Examining how OSINT sheds light on Russia's global military and information operations.The US Challenge: Understanding...
It's Time to Modernize Your Org Charts
Attendees learned how to embrace the future with Ingentis org.manager and they discovered the transformative power of automation. Ingentis org.manager provides a comprehensive solution for organizational design and people analytics. During this webinar, attendees learned about:Outdated drawing tools: ineffective for future-oriented organizationsUp-to-date charts without manual effortsUnlocking organizational insights with versatile chart creat...
F5 Red Hat Tech on Tap
Application and API security are rapidly evolving. Faced with new challenges that span traditional on-premise data centers, distributed multi-cloud environments, and legacy versus modern application deployments, the DoD requires flexible solutions to rapidly address a surging attack vector and an expanding threat landscape. On this Tech on Tap tour stop, we focused on these new security threats and provided you with real-world examples of some...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.