18 webcasts found
+ 27 past events found
Back to Search Begin New Search Save Search Auto-Notify
Critical Infrastructure at Risk: Anatom...
An eagle-eyed technician at a water facility noticed that someone took over his computer and changed the amount of sodium hydroxide being added to the water. This attempt to poison the public's water supply with lye illustrates both the role of technology in the operation of critical infrastructure and the need for maintaining continuous vigilance to thwart cyber-attacks on industrial operations. View this on-demand webinar to gain insights in...
Add Favorite
Defending Aganist Ransomware Attacks
Join our Tenable webinar on defending ransomware through effective vulnerability risk management. Implementing an effective ransomware defense strategy is not an impossible task. By ensuring proper implementation of basic cyber hygiene practices across the organization and focusing limited resources first on what matters most in terms of vulnerability remediation, public sector organizations can transform themselves from "soft" to "hard" rans...
Add Favorite
Preventing Ransomware Attacks with Acti...
Ransomware attacks against state and local governments are on the rise. On June 2nd, the White House urged organizations to take the necessary steps to protect themselves against ransomware. Exploiting Active Directory (AD) and attacking unpatched vulnerabilities are frequent tactics for attackers. Join Tenable and Carahsoft as we discuss how ransomware takes advantage of weaknesses in your Active Directory domains and explore ways your agency...
Add Favorite
BMS Security for Government
Join Tenable and Carahsoft on September 14th as we discuss why industrial cyber security is essential to eliminate many of the core risks associated with the new reality that is present in BMS environments. Learn about the automation and operations technologies employed along with some of the security issues it can introduce; and how you can remain secure. Topics include: The anatomy of a cyber attack on BMS Common vulnerabilities and key sec...
Add Favorite
What's the Secret to Disrupting Ransomw...
Join Tenable and Carahsoft, as we explore the anatomy of a ransomware attack and discuss protective measures you can take to better secure your organization, with emphasis on IT, Active Directory (AD), and OT (operational technology). During this webinar, we will discuss: Ransomware from the attacker's perspective Lessons learned from recent high-profile attacks Protective measures for disrupting and preventing successful exploitation How impl...
Add Favorite
A Zero Trust Approach to Secure Operati...
The increased risk of cyber-attacks targeting Operational Technology (OT) systems and third-party remote access has skyrocketed in our new hybrid world. Agencies working in converged IT/OT industrial environments must achieve complete visibility, security, and control of operations, and they must understand what third-party vendors (suppliers/contractors) and internal privileged users (operators/admins/remote workers) are doing with their acce...
Add Favorite
Strategies to Strengthen Your Active Di...
In 2022, cyber attackers are targeting Active Directory more than ever before. Government organizations need to find, fix, and prevent Active Directory vulnerabilities before mission-critical infrastructure, applications, and data are compromised. You’re invited to hear Tenable, Thundercat Technologies, and Carahsoft speak on their partnership to help you stay ahead of your Active Directory security strategy. In this webinar, you will le...
Add Favorite
Zero Trust Is Not One Size Fits All: Wh...
Join experts from Appgate, Tenable, and Carahsoft as we discuss why the government and industry need to implement a dynamic Zero Trust strategy, and strategies to facilitate securing these platforms and data. In this webinar, you will learn about: How Zero Trust fits into IT, OT, and IoT Common use cases for integrating Zero Trust into IT/OT/IoT security Benefits organizations can expect from implementing a comprehensive Zero Trust strategy ac...
Add Favorite
Tenable Operational Technology Security Demo
This demo showcased how Tenable OT Security delivers complete visibility into an organization’s converged IT/OT infrastructure to help maximize the safety and security of your OT environment. Tenable OT Demo highlights: Learned how organizations gain complete visibility across converged IT/OT operations Discovered how multiple detection methodologies enable organizations to reduce risk by detecting and mitigating threats that impact crit...
Add Favorite
Tenable Active Directory Security Solut...
Discover and prioritize Active Directory vulnerabilities and misconfigurations to disrupt attack paths before attackers exploit them. Tenable Active Directory security prevents and detects sophisticated attacks such as Brute Force, DCShadow, DCSync, password spraying, and more without agents and privileges. Agencies can deploy Tenable Active Directory security anywhere, on-prem, or leverage the cloud. Demo highlights included: Discovering und...
Add Favorite
Back to Search Begin New Search