SANS 2025 ICS/OT Survey Webcast ...
Since 2017, the SANS ICS/OT Cybersecurity Survey has been a foundational benchmark for critical infrastructure asset owners and operators. Each year, SANS explores the growing trends in cyber threats, vulnerabilities, and risks across industrial environments, including actionable recommendations for how organizations can improve their security posture. On this webcast, we will explore results from our 2025 survey. We will cover specific topics...
ThreatOps Challenge: Endpoint Workshop
Take part in the ThreatOps Challenge, a capture the flag style webinar only for Public Sector customers. You’ll dive into a SentinelOne Singularity console filled with alerts, threats and hidden surprises. Each game zeroes in on a unique aspect of the platform, giving you hands-on experience across all its threat hunting capabilities. During this webinar, attendees will learn:How to analyze data and leverage Purple AIHow to uncover cloud...
Enhancing the Recruiting Process with A...
Many recruiters struggle to deliver compelling digital experiences across channels, often due to siloed systems and manual tasks. These inefficiencies can disrupt the candidate journey and negatively impact recruitment efforts. Join our complimentary webinar to see how Adobe Experience Manager (AEM) can help unify and personalize the recruitment process. From career site content to automated follow-up, AEM streamlines every stage, simplifying...
Transforming Utility Analytics: Faster...
Utilities are under constant pressure to improve reliability, manage costs, and modernize operations—but disconnected data and manual processes often slow decision-making. To stay ahead, organizations need a faster way to turn complex data into actionable insights. Join this Truwave and Alteryx session hosted by Carahsoft to see how utilities are using Alteryx to unify data from across systems—operations, assets, and customers...
Boston Cybersecurity Conference
Join Us in Boston for the Futurecon Cybersecurity Event!Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.Don’t miss our special ceremony recognizing our...
November 20, 2025
Organizer:
FutureCon Location:
Boston, MA
Cyber Threats Move Fast - Be Ready to M...
Cyberattacks are moving fast — are you ready to move faster? From zero-day exploits to targeted phishing campaigns, today’s cybercriminals strike quickly and relentlessly. Once they gain access, they steal sensitive data, disrupt operations and demand ransom. Preparation alone isn’t enough — you need the right partner to respond effectively. Join Arctic Wolf for an exclusive webinar to:Explore how full-service, insuranc...
TextOres Directory of PRC Military Leadership
Discover the newly released 2025 Directory of PRC Military Leadership Join TextOre, Inc. for a webinar unveiling the latest edition of the most comprehensive reference on PRC military leadership — the successor to the widely respected Directory of PRC Military Personalities that generations of PLA watchers have relied on. During this webinar, attendees will:Explore the 5,000+ updates featured in the 2025 edition, including over 2,500 bil...
Hands-on Workshop: Getting Started with...
Ready to stop manually configuring cloud infrastructure? IBM Terraform helps government agencies meet mandates like FedRAMP and Cloud Smart by providing consistent, auditable infrastructure across all cloud environments. Join us for an exclusive, hands-on virtual training session designed to help government professionals harness the power of IBM Terraform for secure, compliant and efficient infrastructure management. Register now to experience...
Rebooting The System: Getting Back on T...
The impact of the federal government shutdown on agencies’ IT programs could last for a long time. In the short term, the lack of exposure management means IT systems have become vulnerable due to movement within teams, systems coming off and online, and falling behind on software updates and patches, for instance. Meanwhile, hostile parties are increasing their cyber attacks, raising the risk of major breaches. Other effects, such as mo...
November 20, 2025
Organizer:
Fedinsider Location:
Webcast
Zero Trust Allowlisting
You will learn how to:Align with CISA and NIST CSF 2.0 Zero Trust frameworksUse allowlisting to block unauthorized applications and control what runs in your environmentReduce ransomware risk through proactive endpoint protectionExtend the efficiency of your current security stack
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.