3,085 webcasts found
+ 55942 past events found
Back to Search Begin New Search Save Search Auto-Notify
Transforming Pension Security: A Human-...
State and local government pension systems administrators have the important responsibility of ensuring strong security measures with seamless user experiences in a time of growing digital threats and ever-changing cybersecurity challenges. Attendees joined this webinar to see how advanced data analytics and better digital identity verification made possible by Splunk and ID.me can completely change the way pension programs protect and operate...
Add Favorite
Build Smarter and Innovate Faster with...
Identity and Access Management (IAM) can significantly impact your business's financial outcomes. During this webinar, Okta's experts dove into the strategies and rationale behind IAM's influence on business success. This roundtable was designed for leaders in product development, engineering, and application development to explore how they can leverage Customer Identity and Access Management (CIAM) to distinguish their business in the marketp...
Add Favorite
How to Automate, Orchestrate, and Secur...
Attendees of this webinar explored how BigFix leverages AI to:Improve employee experience using Gen AIAutomate infrastructure managementSecure and manage endpoints across nearly 100 operating systemsEnsure continuous complianceEnhance vulnerability management with award-winning cybersecurity analytics
Add Favorite
GovCon - Summer Shorts - Pricing
COMPLIMENTARY + RECORDED WEBINAR SERIES Join Jennifer Schaus & Associates in this 2 WEEK Special Webinar Series, 2024. Guest Speakers will cover various topics in federal contracting and touch on three main areas:Best Practices - Avoiding Pitfalls - FAQ's - and then take your live questions. COMPLIMENTARY & RECORDED WEBINAR SERIES Tell a friend or colleague!
Add Favorite
Qualys TotalCloud 2.0: Cloud Native App...
In accordance with White House Executive Order 14028, CISA published the Cloud Security Technical Reference Architecture in June 2022 to provide guidance to Agencies on secure cloud services adoption to enable the adoption of Zero Trust. Attendees joined us on August 15th for an insightful webinar where Qualys executives will discuss CISA’s 2022 guidance, the evolution of cloud security, and where the future of Cloud Security is headed....
Add Favorite
TIBCO Messaging Innovations for Digital...
In this webinar, Bobby Liao, Director of Product Management at TIBCO, discussed how TIBCOŽ Platform–Messaging:Creates the infrastructure that facilitates the real-time exchange of data between your systems, applications and componentsEnables real-time data distribution between disparate endpoints wherever they are hosted, while also being a central component of event-driven and streaming data architecturesProvides both open-source and co...
Add Favorite
The Role of Integrity Within Zero Trust
Attendees who joined this webinar learned about:Zero trust as it applies to federal agency cybersecurityThe role integrity plays in enforcing a zero trust approachMethods for achieving integrity using file integrity monitoring (FIM) and security configuration management (SCM)
Add Favorite
Overcoming PDF Signature Challenges in...
Electronic and digital signatures have been around for 24 years, yet implementing them securely and in an approved manner remains an issue today. In this webinar, we covered the major challenges in their implementations and provided solutions to make them a reality in your ServiceNow instance. Discover these 5 key takeaways from this webinar:What are the major challenges?What is the difference between electronic and digital signatures?How does...
Add Favorite
Real Time Business Insights Powered by...
Join Atrium, your go-to Tableau and data strategy partner, in this webinar to discover how Tableau and Salesforce Data Cloud can revolutionize your customer understanding and drive business growth. During this webinar, attendees:Learned how Data Cloud can integrate multiple data sources for a comprehensive 360-degree view of your customersExperienced Tableau and Data Cloud in action as they transform data into actionable insightsGained an unde...
Add Favorite
A New Paradigm for Managing Third-Party...
The MOVEit and GoAnywhere attacks in 2023 ushered to the forefront the importance of having a viable and adaptive third-party risk strategy. If there had ever been the feeling that third-party risk was a secondary stakeholder in the cybersecurity space, the importance of which was elevated only for short periods of time during a crisis, these two attacks shattered that notion entirely. This new reality has compelled security strategists to rap...
Add Favorite
Back to Search Begin New Search