3,085 webcasts found
+ 55966 past events found
Back to Search Begin New Search Save Search Auto-Notify
Strengthening Your Security with Active...
Even the most robust identity governance solutions miss out on the foundational needs of highly secure directory management tasks. By leveraging intelligence already available in your directory, you can improve the security profile of your organization with easy-to-use practical solutions. Attendees joined Netwrix on Wednesday, July 17th, to learn how to discover areas of weaknesses and strategies to address these hidden dangers proactively. A...
Add Favorite
F5 BIG-IP Next - Explore the Next Gener...
Attendees joined F5 and Government Acquisitions at the Celeste Hotel on Wednesday, July 17th for a hands-on lab featuring BIG-IP Next.All BIG-IP users were invited to this personalized training on BIG-IP Next, F5’s Next Generation Platform. During the session, attendees received a first look at the BIG-IP Next platform while going through application deployment exercises to address load balancing, application security, and app access use...
Add Favorite
Revolutionizing Federal Data Management...
During the webinar, attendees:Explored GEN3i Services' expertise in facilitating secure data migrations from legacy systems to modern platforms, enhancing data accessibility and reliability.Understood the significance of Cohesity achieving FedRAMP Moderate Authorization and how this ensured compliance with stringent federal security standards.Learned how to leverage Cohesity’s AI and ML-based ransomware detection and Zero Trust security...
Add Favorite
Navigating Modern Data Protection ...
In today's modern landscape, there is a growing need for robust data loss prevention (DLP) solutions to protect sensitive data and ensure compliance with data privacy regulations. In this webinar, Symantec takes an in-depth look at the evolving cybersecurity threats to organizational data and actionable data protection strategies.Attendees learned:The challenges educational organizations are facing and the importance of applying data protectio...
Add Favorite
Defending Against the Quantum Threat: F...
The day a cryptographically-relevant quantum computer (QRQC) with enough power to break modern encryption is coming and world governments are taking action and advising agencies and commercial entities to start taking action now. Although these powerful quantum computers won't exist for another 5 to 15 years, attackers are already taking advantage of the opportunity to steal valuable secrets through harvesting attacks - where a copy of the dat...
Add Favorite
Navigating the AI Data Governance Landscape
High use of content creation poses a significant impact on records and compliance obligations. In this webinar, we learned key elements to manage data using AI. We also took into account ethical considerations, addressed how to properly navigate regulatory compliance hurdles, and presented actionable strategies for success.Specifically, we discussed:Balancing AI use against the riskResponsible AI frameworksNIST AI risk management modelReal wor...
Add Favorite
Election Integrity in the Digital Age:...
Do you have too many Security Analysts and Engineers sitting around with nothing to do? We didn't think so; you are not alone. You may have heard how security automation can elevate your team and help move you from playing defense and reacting to incoming threats. Go on the offensive, get empowered, and get in control of your security operations to achieve your strategic goals. Splunk’s Security Orchestration, Automation, and Response (S...
Add Favorite
Joint All-Domain Command and Control (J...
JADC2 Strategy provides a vision of a connected battlefield, improving joint force command and control capabilities. Knowledge is power, and a connected environment provides greater insight from increased sensors on the ground, sea, air, and space. But what happens when communication becomes less than perfect? Can JADC2 continue to operate with Denied, Disrupted, Intermittent, and Limited (DDIL) communications? This presentation by HPE ...
Add Favorite
The State of Secure Identity: The Lates...
The log-in box is both the gateway and guardian to your customer facing applications and a prime target for threat actors looking to profit from account takeovers. As these cybercriminals utilize AI to get past the log-in box, protecting your applications also requires sophisticated AI-based layered defenses. Okta’s State of Secure Identity Webinar gave attendees insight into this evolving threat landscape and how you can best defend you...
Add Favorite
2024: FAR Part 49, Termination Of Contracts
Join Washington DC based, Jennifer Schaus & Associates in the 2024 Webinar Series covering The FAR, Federal Acquisition Regulations. This series features guest speakers who will uncover the important details and nuances of The FAR. Get educated about the rules and regulations in the game of federal contracting. This series is COMPLIMENTARY & RECORDED. Recordings are posted on our YouTube Channel. CORPORATE SPONSORSHIPS of this Webinar...
Add Favorite
Back to Search Begin New Search