Enterprise IoT Hands-on Workshop
Did you know that 30% of connected devices on an enterprise network are IoT devices that are unseen, unmanaged and unprotected? What if you could discover 90% of your devices in 48 hours while paving the way for comprehensive Zero Trust?Join Palo Alto Networks for an interactive hands-on workshop and learn how you can eliminate implicit trust and enforce least privilege access with continuous verification and inspection capabilities. Sign up f...
Peak Cyber Symposium
Join us before the Peak Cyber Symposium on Tuesday, September 10th, for an exclusive workshop hosted by Axonius Federal Systems and Palo Alto Networks, where you’ll explore how the combined power of Axonius and Palo Alto Networks XSOAR can transform your cybersecurity operations. This workshop will provide insights into how these two industry-leading solutions work together to enhance your organization’s security posture by streaml...
Mastering your Zero Trust Journey with...
Implementing the Zero Trust framework is a comprehensive endeavor encompassing people, processes, and technology. For State and Local Agencies and Education Institutions, maintaining uninterrupted operations around the clock is crucial, especially in increasingly threatened and complex environments with distributed users, applications, and resources. Integrating tools to consistently enforce policies and automate processes across the entire en...
The Power of AI in Action
Security teams have an important job: to protect the organization from an ever-evolving threat landscape. With growing amounts of data, ever-changing threats and the sheer volume of security alerts, this can feel overwhelming. But there is a better way. Cortex XSIAMŽ unites SOC capabilities that include XDR, SOAR, SIEM, ASM and others into a single SecOps platform. It empowers security analysts with AI-driven outcomes and an automation-first a...
Revolutionizing Cloud Data Security wit...
As data volumes continue to soar and regulations become increasingly stringent, organizations grapple with the challenge of comprehending their sensitive data, controlling access to it and pinpointing potential vulnerabilities. To regain visibility and control, forward-thinking organizations are turning to data security posture management coupled with data detection and response. In this session, you'll learn:The security and compliance risks...
Transforming Federal Defense With AI, C...
The applications of artificial intelligence (AI) in combination with cloud computing and data security are limitless. While federal agencies are increasingly implementing AI to safeguard critical assets, the integration of AI comes with a multitude of risks. Generative AI tools like ChatGPT can change threat vectors for cyberattacks, and the uncertainty of where large language models (LLMs) get their data from brings up ethical concerns. Bad a...
June 11, 2024
Organizer:
GovExec Location:
Webcast
Public Sector Ignite 2024
Digital transformation remains a top priority in the public sector, where global and technology trends continue to drive unprecedented change. As public sector organizations tap into AI, cloud computing, IoT and infrastructure modernization to accelerate their missions, questions remain: How can organizations enable cyber resilience without hindering the mission? How can cyber leaders remain compliant with new government mandates while amplify...
AI: Future Threats and How to Combat Them
The threats facing federal agencies are becoming more challenging to predict and defend against. And for too long, security operations center (SOC) analysts have been inundated with alerts to triage manually, creating an inefficient game of whack-a-mole while critical alerts are missed and vulnerabilities remain exposed. Emerging technologies like artificial intelligence have the potential to flip that paradigm and put defenders back in the dr...
Cloud DevSecOps with TF, Prisma & AWS
From scanning infrastructure as code (IaC) for security misconfigurations to implementing automated DevSecOps workflows, this 2-hour workshop will provide a hands-on experience to automate your cloud security. We’ll use this Workshop Documentation as a guide to walk through: An overview of DevSecOps and Terraform infrastructure as code (IaC) Getting started with Bridgecrew to scan for Terraform misconfigurations Setting up CI/CD with Git...
Securing Education: Empowering K-12 Lea...
In the face of escalating cyber threats targeting K-12 education in the United States, educational leaders play a pivotal role in safeguarding their institutions, students, and staff. To equip these leaders with the knowledge and tools necessary to combat cyber risks, we present, Securing Education: Empowering K-12 Leaders with Security Operations Center (SOC) Strategies. Led by a seasoned cybersecurity professional with expertise in the K-12...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.