Back to Search Begin New Search Save Search Auto-Notify
Protect against Ransomware
This webinar will explore how Dell EMC and RSA can successfully help secure your infrastructure, increase your platform efficiency, and simplify your management processes. Join us for an on demand webcast to learn more about how to secure your workspace with data protection and threat detection. During this webinar, you can expect to learn about: How Dell EMC's Cyber Recovery solution can help protect data, identify suspicious activity, and pe...
Add Favorite
Managing Third-Party Risk
Penetration of government networks through vulnerable third-party service providers is on the rise. Now more than ever, protecting Controlled Unclassified Information (CUI) in nonfederal systems is of paramount importance as it can directly impact the ability of the federal government to successfully conduct its missions. Service providers are playing a large and critical role in the daily operations of the federal government. Third-party rela...
Add Favorite
Operational Resiliency: The Newest Stra...
The past year has been stressful for government agencies and businesses alike. The COVID-19 pandemic has altered every aspect of government business, from having to quickly enable a remote workforce, to seeing an increase of cyberattacks and breaches, to the greater dependence on third party providers. Any of which on their own can be challenging and severely impact the organization. If nothing else, this period highlighted the fact that exten...
Add Favorite
Meeting the NSM-8 MFA Mandate With RSA
Explore our on-premises authentication offering, designed to cater to customers seeking a lightweight, self-contained MFA solution across various environments. In this on-demand webinar, we covered: A wide range of identity solutions, from air-gapped on-premises to Cloud. Security implications for different deployment scenarios. In-depth insights into the NSM-8 MFA mandate, ensuring your organization's compliance.
Add Favorite
Streamlining Identity Hygiene & Access...
During this on-demand webinar, attendees learned how RSA Governance & Lifecycle enables agencies to: Reduce identity risk by providing centralized visibility and control of all user accounts and access. Maximize time and dollar investments with existing providers while enhancing the organization’s security posture. Streamline compliance by identifying Segregation of Duties violations, auditing all identities and access permissions,...
Add Favorite
Migrating from a Legacy VPN to a ZTNA S...
Existing solutions based on virtual private networks (VPN) can’t keep pace with the scale of remote users and often lead complicated architectures and a poor end-user experience. Also threat actors know that VPNs are easily compromised – and give implicit access to the underlying network. New security challenges present themselves that traditional remote access solutions weren't designed to solve. To address this new reality, organ...
Add Favorite
Don't Let Your Healthcare Help Desk Bec...
View this on-demand webinar from RSA and Carahsoft where we dive into protecting your healthcare organization's IT help desk from cyberattacks.Attendees learned:Why healthcare help desks are such a lucrative target for cybercriminals.The potential consequences of a successful attack on your help desk.How to leverage identity governance, process automation, and a defense-in-depth approach to fortify your defenses.Actionable steps you can take t...
Add Favorite
Meet the Presidential Cybersecurity Man...
Watch this on-demand webinar designed to empower federal agencies to achieve the cybersecurity goals outlined in the latest presidential mandate. Discover how RSA's newly FIDO2-certified authenticator app can transform your agency's security infrastructure. Learn how the RSA authenticator app can help federal and other government agencies defend and modernize key infrastructures, enhance and scale collaboration between public and private secto...
Add Favorite
Getting Government Agencies to Secure P...
View this webinar from RSA & Carahsoft to gain valuable insights from a leading cybersecurity expert and learn how your agency can effectively implement passwordless authentication while meeting critical compliance requirements.
Add Favorite
Back to Search Begin New Search