Network Derived Intelligence: Are Your...
Network-derived intelligence provided real-time, immutable data about what was happening within your environment beyond standard hack-prone logging. Participants joined Gigamon to explore how Network-Derived Intelligence helped with vulnerability detection, weak ciphers, non-standard port usage, and other cyber challenges that logs couldn’t address. During the webinar, attendees learned:What exactly is on your network in real-timeTo over...
Innovations That Shaped Zoom for Govern...
Zoom for Government is for your mission. We enable the federal mission through an easy-to-use and innovative collaboration platform. Watch the following webinars on demand exclusive to the public sector!Innovations That Shaped Zoom for Government in 2024 and a Look Ahead to 2025Review 2024 Highlights: Recap the key product launches and feature updates that refined the landscape this year.Showcase Real-World Impact: Explore use cases where thes...
Modernizing the Approach to Physical Se...
The physical security threat landscape is evolving once again. From dynamic situations such as protests and civic unrest to more serious cases of workplace violence and threats to personal safety, organizations and government agencies are struggling to meet these demands. These challenges are amplified by budget cuts and limited resources. So, how do leaders and security professionals respond? Advancements in technology are enabling agencies t...
Transforming Public Service: How Geoloc...
How many times during your week or month do you navigate a map to make decisions about things like where you’re going to dinner, your running route, or which dry cleaner is closest to your office? What if finding a government service could be just as user-friendly, in an application that is familiar? During this webinar, Avaap explored how geolocation technology is transforming government services. We investigated the innovative solution...
Unlocking the Power of Symantec SASE fo...
This webinar discussed how Symantec Secure Access Service Edge (SASE) can transform your security strategy, providing seamless protection across all your end-points, users, and applications. Key topics discussed during the webinar include:The evolution of SASE and its role in securing workforcesHow Symantec SASE integrates with existing infrastructures to ensre scalability and flexibiltyDeep dive into Symantec's cloud-delivered security servic...
Accelerating Federal Insights with Auto...
Access this Alteryx & GAI webinar recording to discover how federal agencies can save thousands of hours by automating manual data processes and leveraging advanced analytics. Discover how one agency transformed its operations, achieving efficiency and accuracy with the Alteryx Enterprise Platform.During this webinar, attendeesExplore scalable analytics solutions for federal missions and workflows.Learn how automation replaced 2,000 hours...
Data Management Finally Made Simpler -...
Are you curious about how to transform your data management? Attendees learned how to:How to simplify complex data managementBring together different types of storageIncrease efficiency and unlock new opportunitiesRegister today for this partner session on how to securely manage data across any environment.
ATO in a Day: Lessons from the USMC MCC...
Legacy compliance practices and waterfall acquisition models have hindered mission readiness for years—costing for some over $100K per month, per system and delaying the deployment of critical systems by more than two years. Between 2018 and 2022, only one of five major ATOs achieved a 3-year authorization, frustrating leadership and perpetuating bottlenecks. This fireside chat revealed how the USMC Community Services tackled these chall...
Enhance Your Email Security with Mimecast
In today’s ever-evolving threat landscape, email security is more critical than ever. Attendees of this exclusive demo learned how Mimecast's advanced email security solutions can protect their organizations from the latest threats. View the on-demand recording to learn more about how Mimecast can protect your organization!
F5 Capture the Flag
The F5 DISA team hosted an interactive Capture the Flag competition where attendees competed against others to hunt for API vulnerabilities and learn how they work. In this lab and Capture the Flag exercise, attendees learned how to identify and mitigate:Hard-Coded Secrets: Many applications exchange user credentials for a hard-coded token or key. This key allows anyone who knows it to gain access to the application, however, many times these...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.