Back to Search Begin New Search Save Search Auto-Notify
2024: Big Tech In FED Gov - Apple (6 of 15)
This Webinar Series will profile the BIG TECH companies and their intersection with the US Federal Government. We will look at the big tech contracts within the Defense Department, Civilian Departments and Independent Agencies as well as stock price, current news, federal contracting trends, lobbying information if available, and more. Don't miss this lively data filled webinar series courtesy of federal data and analysis from GOVSPEND. Webina...
Add Favorite
From the Frontlines: Lessons learned fr...
Deploying Zero Trust for an Operational Technology network differs from deploying it on an IT network. Dragos and BlastWave have learned hard lessons with customers on the best practices for deploying OT Zero Trust in the real world and shared these lessons with attendees. They also explored how the pillars of the multiple OT cybersecurity frameworks (NIST, DoD, NIS2, etc.) are combined to provide a deployable solution for critical OT networks...
Add Favorite
Enhancing Homeland Security Operations...
In today's fast-paced digital environment, the Department of Homeland Security (DHS) faces complex challenges in maintaining robust IT operations and ensuring the security of critical infrastructure. This webinar included the transformative potential of Splunk IT Service Intelligence (ITSI) to streamline and enhance IT operations within DHS. Participants joined us as we explored how Splunk ITSI’s advanced analytics, machine learning capa...
Add Favorite
Transform Your Printing Operations - Tu...
Participants joined the Tungsten Automation webinar to learn more about how Printix could transform their printing operations and unlock new possibilities for their business. Printix was introduced as a cloud-based print management solution that offered a comprehensive print infrastructure and secure printing environment. It was designed to enhance efficiency, productivity, and cost savings for businesses of all sizes. By eliminating the need...
Add Favorite
Using PPKs for Post-Quantum Security in...
Accelerating advancements in quantum computing are making the prospect of breaking classical cryptography more real with every passing today. Organizations rely on firewall site-to-site IPSec VPN security to protect their critical data. However, threat actors are already storing encrypted communications today to decrypt in the future, using quantum computing or other advanced capabilities (aka “Harvest Now, Decrypt Later”). IPSec V...
Add Favorite
Mastering Enterprise Agile with ServiceNow
In an era where missions evolve at lightning speed, staying ahead requires more than just quick thinking - it demands agile planning and flawless execution. The stakes have never been higher for agencies and commands to adapt swiftly and ensure their teams are prepared and empowered with cutting-edge tools and strategies. This dynamic discussion helped attendees elevate their Agile game. They learned how they can transform their Agile delivery...
Add Favorite
Empowering Higher Education: Preparing...
In today’s rapidly evolving academic landscape, leveraging the power of AI-driven tools like Copilot for Microsoft 365 is essential to stay ahead. Attendees joined us for an in-depth exploration of how Higher Education institutions could prepare to unlock the full potential of Copilot for Microsoft 365. This webinar guided attendees through seamlessly integrating Copilot into their organization, enhancing efficiency and enriching experie...
Add Favorite
From Compliance to Leadership: How CMMC...
On October 10th, our distinguished panel explored how organizations can leverage CMMC (Cybersecurity Maturity Model Certification) not only to meet compliance requirements but to elevate their long-term security leadership. By gathering insights from top experts across industries, the panel demonstrated how CMMC acts as a catalyst for building a more mature and resilient security posture, enabling businesses to lead confidently in the face of...
Add Favorite
Preparing for Your Crypto Future: Marke...
From the Pentagon to boots-on-ground, cloud computing is driving actionable, data driven decisions that keep our nation safe. Effective data analytics require edge to cloud data collection as well as cloud to edge data dissemination. The secure transport of this data over disparate networks is driving interdependencies between data links over secure Layer 3 using High Assurance IP Encryption (HAIPE) and secure Layer 2 using Ethernet Data Encry...
Add Favorite
Insider Risk Programs: Three Truths and a Lie
In this webinar, Everfox Director of Enterprise User and Data Protection, Michael Crouse, shares insights on why insider risk management is not about cyber controls and checklists that only show what occurred without indicating why. Insider risk sits at the junction of organizational and technical controls where an insider risk management plan must address the needs of the program before, during and after critical events, not just during incid...
Add Favorite
Back to Search Begin New Search