Back to Search Begin New Search Save Search Auto-Notify
10 Tips to Perfect Public PDFs
Join our complimentary webinar to learn how to quickly improve the readability and reliability of your PDFs for optimal user experiences with improved security, compression, and searchability features. Specifically, this webinar will explore: Security Tips – remove sensitive metadata, prevent unwanted changes, and learn about sanitization. Readability and Reliability Tips – provide automatic bookmarks, make documents searchable, an...
Add Favorite
Answer the White House Call to Action I...
In this webinar, Logan Brown, CEO at Exodus Intelligence, will explain the importance of vulnerability intelligence with the White House push to increase cyber defense, and the use of Exodus' methodology to analyze N-Day and Zero-Day threats. Exodus Intelligence employs some of the world's most advanced reverse-engineers and exploit developers to provide Government agencies the unique ability to understand, prepare, and defend against the ever...
Add Favorite
What does Zero-Trust Mean to SLED Cyber...
Join Mitch Rosen, Global Director of Solutions Engineering, as he discusses how CISA and OMB's ZTA pillars directly align to ongoing modernization and security priorities of state, local, and educational institutions. In this webinar, topics will include: What are the Zero-Trust pillars and why are they important? How do you augment existing processes with Zero-Trust architecture? As SLED organizations improve their cybersecurity posture, how...
Add Favorite
Hardening the Cyber Quiver
Traditional approaches to information security are reactive and antiquated. In an era where technology is on-demand, we can no longer afford to be reactive, we must revolutionize all security practices while increasing our capabilities.Following on the heels of executive directives and combined guidance, we must evolve to meet the demands of cybersecurity while embracing Zero Trust and the enablers of secure infrastructures, continuous monitor...
Add Favorite
The Federal Healthcare Threat Landscape...
Join us for this intel and training perspective with Proofpoint. Agenda: Overview of the current Federal Healthcare threat landscape and Q1 2022 analysis - including Conti, Emotet, COVID-19, Credphish, and everything in between Current Federal Healthcare attacks and lures, and what to do about them - threat intelligence to support IT/messaging, security teams, and focused high-payoff security awareness training Conclusion and wrap-up - recomme...
Add Favorite
Adobe ColdFusion Advanced Workshop
Due to popular demand, registration for this event is now closed. We apologize for this inconvenience. Join our complimentary Adobe ColdFusion Advanced Workshop to learn about the fundamental building blocks of DevOps, Adobe ColdFusion, and Continuous Integration/Continuous Delivery (CI/CD). Throughout this workshop, you will be provided with clear illustrations on how to increase efficiency while adopting modern development principles, and m...
Add Favorite
Add an Early Warning System to Your Sec...
From Log4J to hybrid work models, the evolving and dynamic IT environment expands the attack surface creating more vulnerabilities and risks for public sector organizations. Understand the cyber security challenges Attack Surface Management (ASM) solves and how it can be easily integrated into any cyber defense program.Join Jonathan Cran, VP R&E, Attack Surface Management, and Alexa Rzasa, Sr. Product Marketing Manager, to learn how ASM ca...
Add Favorite
Modernizing Federal Health IT
The last two years have shown us that the Federal Health sector has and continues to transform into a digital powerhouse. As the transformation continues, DevSecOps and cloud technologies are becoming more prominent. Software factories are being stood up in order to become more agile and create opportunities to create consistent processes that apply across all application development and deployment. Join GitLab experts on April 28th to: Learn...
Add Favorite
Secure Data Center Hosting with Atlassian
As more agencies adopt Atlassian services in the cloud, there are increased privacy and security risks, of which the public is acutely aware. For IT professionals, compliance with privacy and security standards is critical.The Federal Risk and Authorization Management Program (FedRAMP), standardizes the approach to security assessment, authorization and monitoring for cloud products and services used by federal agencies to protect data in the...
Add Favorite
Build a More Secure Future with Google...
During this webinar, we will cover: Google Workspace as a solution for continuity of operations and disaster recovery Overview of Google security offerings: Security Command Center, Chronicle, VirusTotal, reCAPTCHA, BeyondCorp, and Work Safer program
Add Favorite
Back to Search Begin New Search