Protect against Ransomware
This webinar will explore how Dell EMC and RSA can successfully help secure your infrastructure, increase your platform efficiency, and simplify your management processes. Join us for an on demand webcast to learn more about how to secure your workspace with data protection and threat detection. During this webinar, you can expect to learn about: How Dell EMC's Cyber Recovery solution can help protect data, identify suspicious activity, and pe...
Managing Third-Party Risk
Penetration of government networks through vulnerable third-party service providers is on the rise. Now more than ever, protecting Controlled Unclassified Information (CUI) in nonfederal systems is of paramount importance as it can directly impact the ability of the federal government to successfully conduct its missions. Service providers are playing a large and critical role in the daily operations of the federal government. Third-party rela...
Operational Resiliency: The Newest Stra...
The past year has been stressful for government agencies and businesses alike. The COVID-19 pandemic has altered every aspect of government business, from having to quickly enable a remote workforce, to seeing an increase of cyberattacks and breaches, to the greater dependence on third party providers. Any of which on their own can be challenging and severely impact the organization. If nothing else, this period highlighted the fact that exten...
Meeting the NSM-8 MFA Mandate With RSA
Explore our on-premises authentication offering, designed to cater to customers seeking a lightweight, self-contained MFA solution across various environments. In this on-demand webinar, we covered: A wide range of identity solutions, from air-gapped on-premises to Cloud. Security implications for different deployment scenarios. In-depth insights into the NSM-8 MFA mandate, ensuring your organization's compliance.
Streamlining Identity Hygiene & Access...
During this on-demand webinar, attendees learned how RSA Governance & Lifecycle enables agencies to: Reduce identity risk by providing centralized visibility and control of all user accounts and access. Maximize time and dollar investments with existing providers while enhancing the organization’s security posture. Streamline compliance by identifying Segregation of Duties violations, auditing all identities and access permissions,...
Migrating from a Legacy VPN to a ZTNA S...
Existing solutions based on virtual private networks (VPN) can’t keep pace with the scale of remote users and often lead complicated architectures and a poor end-user experience. Also threat actors know that VPNs are easily compromised – and give implicit access to the underlying network. New security challenges present themselves that traditional remote access solutions weren't designed to solve. To address this new reality, organ...
Don't Let Your Healthcare Help Desk Bec...
View this on-demand webinar from RSA and Carahsoft where we dive into protecting your healthcare organization's IT help desk from cyberattacks.Attendees learned:Why healthcare help desks are such a lucrative target for cybercriminals.The potential consequences of a successful attack on your help desk.How to leverage identity governance, process automation, and a defense-in-depth approach to fortify your defenses.Actionable steps you can take t...
Meet the Presidential Cybersecurity Man...
Watch this on-demand webinar designed to empower federal agencies to achieve the cybersecurity goals outlined in the latest presidential mandate. Discover how RSA's newly FIDO2-certified authenticator app can transform your agency's security infrastructure. Learn how the RSA authenticator app can help federal and other government agencies defend and modernize key infrastructures, enhance and scale collaboration between public and private secto...
Getting Government Agencies to Secure P...
View this webinar from RSA & Carahsoft to gain valuable insights from a leading cybersecurity expert and learn how your agency can effectively implement passwordless authentication while meeting critical compliance requirements.
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.