Back to Search Begin New Search Save Search Auto-Notify
Mastering the DoD Zero Trust Journey: B...
In a rapidly changing digital landscape, federal agencies face a constant battle against cyber threats. With the stakes higher than ever, you need a strategic advantage to safeguard your agency's sensitive assets and ensure the resilience of the Department of Defense network environment. Embracing the DoD Zero Trust Strategy is the key to unlocking this potential and positioning yourself as a hero in this evolving story. View the engaging webi...
Add Favorite
Mission First: Public Sector Podcast Series
Listen on-demand to episode three of our podcast series dedicated to covering the latest and greatest in IT achievements - keeping you ahead of the competition. Hear from Elizabeth Cappello, Deputy Chief Information Officer (CIO) for the Department of Homeland Security (DHS), and Craig Bowman, Senior Director - Federal for VMware, who will discuss: Meaningful implementation of Artifical Intelligence (AI) in cybersecurity How to view open stand...
Add Favorite
The Craft of Creating Virtual Experiences
Watch Adobe’s 3-part on-demand webinar series, The Craft of Creating Virtual Experiences, with Adobe Connect Evangelist, Alistair Lee. Each on-demand webinar focuses on a different component of designing your virtual meetings, events, and trainings to maximize effectiveness and showcase how to leverage the full capabilities of Adobe Connect. Fill out the form below the table to access the session recordings, available slide decks, and he...
Add Favorite
How to Resist Ransomware
Hear from federal cyber leaders at DOD and CyberArk on the best tips, tricks and strategies for resisting ransomware and protecting federal data. Ransomware attacks against federal IT systems surged to unprecedented levels at the beginning of the COVID-19 pandemic and show no sign of abating, with ransomware losses surpassing $1 billion in the second half of 2021. Federal agencies handling mission-sensitive medical, financial, demographic and...
Add Favorite
Kickstart to Compliance Series: Step Tw...
Join us for the next session of our Kickstart to Compliance webinar series covering the second step on your journey toward achieving ZTA data pillar optimal level. To comply with federal mandates and protect sensitive data, agencies must develop an approach to identify and prioritize data protection needs. This includes understanding the different techniques for field and record level protection, such as encryption, persistent data masking, d...
Add Favorite
It's Your World and We Prevent Adversar...
Adversaries are relentless and continue to go after critical government infrastructure, communities, and schools. In today’s threat landscape, it takes a team and tools to prevent these cyber-attacks. During this webinar, experts from Mimecast and CrowdStrike discussed how to harness threat intelligence in a single XDR framework. Register to view this on-demand recording.
Add Favorite
Automation for Beginners, Geniuses...an...
Automation isn’t out to take your position… or anyone else’s for that matter. It’s also not a tool reserved for the IT elites and other geniuses in the academic field.Automation is about helping everyone do their jobs more effectively and efficiently by removing the toil and drudgery of monotonous, day-to-day tasks and empowering employees to focus on more challenging and rewarding tasks. It also removes the error-pron...
Add Favorite
Discover and Create with Helpful Tools...
Adobe Premiere Pro is the industry-leading standard for video editing, giving users all the tools they need to successfully create a project and edit it from start to finish. From animations, caption creation, titles, transitions, and more, there's always something to discover within Adobe Premiere Pro, making it easy to find what you need to build your skills step-by-step. Watch our on-demand webinar to discover how Adobe Premiere Pro allows...
Add Favorite
Tenable Active Directory Security Solut...
Discover and prioritize Active Directory vulnerabilities and misconfigurations to disrupt attack paths before attackers exploit them. Tenable Active Directory security prevents and detects sophisticated attacks such as Brute Force, DCShadow, DCSync, password spraying, and more without agents and privileges. Agencies can deploy Tenable Active Directory security anywhere, on-prem, or leverage the cloud. Demo highlights included: Discovering und...
Add Favorite
Enhancing Recovery from Natural ...
Attendees of this webinar listened as VMware's Senior Staff Solutions Engineer, Matthew Place, discussed: What is a disaster? Disaster Recovery vs. Ransomware Recovery – how are they different? A review of VMware disaster recovery capabilities A demo of a recovery scenario Register to view this on-demand recording.
Add Favorite
Back to Search Begin New Search