Back to Search Begin New Search Save Search Auto-Notify
TechNet Cyber Webinar Series
Leading up AFCEA’s TechNet Cyber event, SIGNAL Media is hosting four webinars featuring experts from within DISA. The webinar subjects include new leadership, emerging technology, DISA's Small Business Office and Procurement Service Directorate and virtual recruiting. These webinars will keep the TechNet Cyber conversation going leading into the December event. One registration will provide you with notification of webinar broadcast date...
August 5, 2020
Organizer: Signal
Location: Webcast
Add Favorite
Identity Governance in Multi-Cloud Envi...
These days, more than three out of four agencies use multiple cloud platforms. This gives them the freedom to match the requirements of each use case to the unique strengths of each cloud platform, whether it’s AWS, Azure or Google Cloud Platform. What these agencies lack, however, is a way to effectively and securely govern access across these multi-cloud environments. These challenges leave businesses open to the risks and costs of non...
July 28, 2020
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Legacy PBX Migrations and Connecting Di...
The public sector needs modern and scalable alternatives to legacy PBXs. In many cases, Microsoft Teams is becoming the preferred alternative since so many are already leveraging it for video calls, screen share, chat, and file sharing. The recent health crisis has dramatically accelerated this adoption and IT teams suddenly have a trained user community, ready and willing to expand their use of Teams to include making and receiving phone call...
July 8, 2020
Organizer: AFCEA International
Location: Webcast
Add Favorite
Why Just-in-Time (JIT) Privileged Acces...
A true least-privilege security model requires users, processes, applications, and systems to have just enough rights and access—and for no longer than required—to perform a necessary action or task. While organizations are increasingly effective at applying the “just enough” piece using privileged access management (PAM) solutions, they have largely neglected the time-limited and persistent risk part of the equation....
March 17, 2020
Organizer: SIGNAL Media
Location: Webcast
Add Favorite
Why Just-in-Time (JIT) Privileged Acces...
A true least-privilege security model requires users, processes, applications, and systems to have just enough rights and access—and for no longer than required—to perform a necessary action or task. While organizations are increasingly effective at applying the “just enough” piece using privileged access management (PAM) solutions, they have largely neglected the time-limited and persistent risk part of the equation. T...
March 17, 2020
Organizer: AFCEA International
Location: Webcast
Add Favorite
2019 State of the Phish Report
2019 State of the Phish ReportPhishing continues to be the number one attack vector. Why? Because it works — all too well. Industries of every kind fall prey to these scams — from financial organizations to government contractors to healthcare firms. Today’s cybercriminals manage to evade even the most sophisticated security technology through carefully planned, socially engineered email attacks that are only getting more adv...
May 23, 2019
Organizer: AFCEA International
Location: Webcast
Add Favorite
Achieving Instant Situational Awareness...
The proliferation of intelligence, surveillance and reconnaissance (ISR) information is radically changing the landscape of the defense and intelligence community. Command centers’ designers and operators current focus is determining how to use available ISR information sources to assess situations immediately and better support the warfighter. A next-generation command and control infrastructure solution simplifies multi-classification...
May 2, 2019
Organizer: AFCEA International
Location: Webcast
Add Favorite
The State of the Phish: Protecting Your...
Phishing continues to be one of the most dangerous and complex cybersecurity threats facing organizations and end users today. Join Wombat Security Vice President of Marketing, Amy Baker, to review and analyze the findings from the 2017 Wombat Security State of the Phish report. The annual report is compiled from tens of millions of simulated phishing attacks sent through Wombat’s Security Education platform over a 12-month period. The r...
April 12, 2017
Organizer: SIGNAL
Location: Webcast
Add Favorite
Back to Search Begin New Search