Back to Search Begin New Search Save Search Auto-Notify
Avoid Downtime by Protecting Your Opera...
Cyber-attacks on critical infrastructure increased 2000% in 2022, often damaging critical operations. Remote vendors and workers have complicated the situation even more by using personal laptops, BYOD and other devices with fewer security barriers on their home networks than they would have in the workplace. These remote connections have blurred the IT-OT segmentation and expanded the attack surface providing new entry points for hackers to e...
Add Favorite
Alteryx + Tableau: Minimize Your Repeti...
Do you struggle to quickly and easily clean/combine multiple data sets to feed your Tableau dashboard? Watch this brief Alteryx demo going over how Alteryx can help eliminate your manual and repetitive tasks. During this brief Alteryx demo, attendees: Received an overview of the Alteryx toolkit Learned how to ingest, blend, and clean multiple different data sets in one workflow Discovered how to automate the workflow in Alteryx Server
Add Favorite
Report Card on Risk: Managing Risk in H...
A new generation of faculty and students, technological pressures, rising costs, and emerging risks present a unique set of obstacles for higher education institutions. Watch our on-demand webinar to hear industry experts discuss the risks facing higher education executives today, how an integrated approach to risk management and technology can help manage those risks, and the advantages of leveraging one platform to power innovation and conne...
Add Favorite
CompTIA CySA+ certification (CS0-003) c...
Information security analyst is one of the fastest-growing job categories in the U.S., with 35 percent overall growth expected by 2031. CompTIA’s Cybersecurity Analyst+ (CySA+) is one of the most popular certifications related to the role — and it’s getting an update in 2023 to align with the most in-demand knowledge and skills requested by employers. Join Patrick Lane, Director of Certification Product Management at CompTIA,...
Add Favorite
CompTIA PenTest+: Everything you need t...
Penetration testers find and report vulnerabilities before they can be exploited. CompTIA’s PenTest+ is one of the best certifications to validate those skills, and it’s being updated to align with the most up-to-date hacking and pentesting skills requested by employers in 2021. Join Patrick Lane, Director of Products at CompTIA, to get the inside scoop on the latest PenTest+ changes, including: Updated PenTest+ domain areas and jo...
Add Favorite
CompTIA CASP+: Everything You Need to K...
Want to be an advanced cybersecurity practitioner? Then CompTIA’s CASP+ certification may be the perfect fit for you. The popular certification is getting an overhaul heading into 2022 to ensure it validates the most relevant and in-demand skills — from security architecture and operations to engineering and governance. Join Patrick Lane, Director of Products at CompTIA, to get the inside scoop on the latest CASP+ changes, includin...
Add Favorite
Digital Forensics Careers: Fact vs. Fiction
Forget what the crime scene TV shows have told you — digital forensics is not done on an overhead projector while the whole department watches! Learn about the day-to-day work of a digital forensics professional from a team of experts who have been putting in the work for decades! In this one-hour live event, you will learn: The types of tools you'll use to help bring criminals to justice Why a lack of technical experience isn’t a...
Add Favorite
Top 40 Federal Contractors - PROFILE #2...
Please join Jennifer Schaus & Associates in our COMPLIMENTARY Webinar Series in 2023. ALL WEBINARS ARE COMPLIMENTARY & RECORDED. Please find the recordings on our YOUTUBE Channel, along with 500+ government contracting webinars. In 2023, we will profile the TOP 40 FEDERAL GOVERNMENT CONTRACTORS, including: Company Profile Small Business Liaison Contact Details Company Contract Trends - Defense vs Civilian Subcontracting Opportunities O...
Add Favorite
Securing Your Open-Source Software Befo...
Are your developers using GitHub, DockerHub, Jenkins or Bitnami as an Open-Source Code Repository? VMware’s Application Catalog (VAC) provides: Curated/secured/signed images pulled from these and other repositories The creation of secure images that can be placed into your own private repository Images that are continuously updated and secured, thereby removing the possibility of using vulnerable images in your software development Autom...
Add Favorite
Google Cloud Looker Webinar
In this session, attendees learned how to: Establish a single source of truth for all your data. Empower business users to explore data. Enable alerting so that your data speaks to you.
Add Favorite
Back to Search Begin New Search