Back to Search Begin New Search Save Search Auto-Notify
A Blueprint to Defeat Social Engineerin...
A new social engineering-led threat is targeting IT Help Desks, and new strategies are required to defend against it. Gangs like Scattered Spider are honing their techniques and tools to exploit weaknesses in your security process and target institutions like yours with ransomware and data theft. Visionary CISOs are implementing novel defenses to fight back.During this webinar, attendees learned:What is the new social engineering threat?Which...
Add Favorite
Unified Approach for Continuous Threat...
State and local governments and educational institutions face a growing challenge: securing interconnected IT and OT systems from modern cyber threats. Traditional siloed defenses are no longer enough. This webinar pertained to cybersecurity leaders ready to move beyond fragmented strategies and embrace a cohesive ‘whole-of-state’ approach. Attendees explored how to build a unified cybersecurity framework that leverages shared reso...
Add Favorite
Optimizing AI, Analytics and Databases...
Carahsoft hosted a live session highlighting the latest updates to the HPE Alletra Storage MP B10000 platform, including R5 enhancements and key workload insights. Attendees learned how this innovative storage solution supported a broad ecosystem of enterprise applications and drove success across industries. What was covered:What’s new in the HPE Alletra Storage MP B10000 and R5 updatesHow to optimize performance for AI, SAS Analytics,...
Add Favorite
Beyond Extractions: Rethink How You Sha...
There’s so much more to mobile evidence workflows beyond the device extraction. From the moment a device is submitted to the lab, maintaining the chain of custody is especially critical, and sharing that digital evidence with key stakeholders only adds to the challenge. However, many agencies are still using old habits and risky shortcuts during evidence handoffs that can ultimately delay justice.Cellebrite can solve these issues for you...
Add Favorite
Digital Transformation through Integration
As digital threads and AI become a larger component of enterprise infrastructure, being able to manage data integration at scale is critical for operational efficiency. During this webinar, attendees learned how MuleSoft enables operational efficiency and digital transformation through integration. Download the on-demand recording to:Learn the benefits of a layered integration strategyUnderstand how integration is paramount to enterprise AIRef...
Add Favorite
Market Myths on AutoSys & Its Futuristi...
During this webinar, attendees explored the strategic direction of AutoSys and how innovations are designed to empower IT teams with more intelligence, felxibility, and autoamtion at scale. This webinar provided a clear snapshaot of where AutoSys stands today—driving operational efficiency, ensuring reliability, and enabling scalability across hybrid environments. Attendees learned about:The current and future state of AutoSysSubstantial...
Add Favorite
Advancing Military and Veteran Health I...
Military and Veteran Health IT leaders face unique security challenges requiring robust and flexible solutions. During this webinar, Zscaler spotlighted Trusted Internet Connections (TIC) 3.0 and its pivotal role in strengthening security while enabling seamless interagency collaboration. Attendees gained insights into implementation strategies and compliance requirements that align with the dynamic needs of the Federal health community. What...
Add Favorite
It's Not the Breach. It's the Spread: I...
This session explored the critical role of cyber resiliency in helping organizations withstand and recover from today's evolving threats. We dove into strategies for reducing attack surfaces, visualizing networks, and securing critical IT assets – while also examining how compliance regulations can enhance security and safeguard sensitive data. During this webinar, attendees:Gain actionable insights to strengthen their security postureLe...
Add Favorite
Respond Faster, Resolve More with Jira...
Government IT teams are being asked to do more with less while delivering faster, compliant services without disruption. The right ITSM approach can make all the difference. In this session, attendees learned how to:Understand CMDB fundamentals to improve visibilityOptimize incident response for faster resolutionDrive compliance without slowing your teams down
Add Favorite
The Missing Link in Threat Detection: C...
When it comes to securing industrial environments, host and network data are two halves of the same story. Network data shows you what’s moving, where it’s going, and how it flows, but without host data, you can miss the “why” and “how” behind suspicious activity. Host data gives the inside view: process activity, system changes, and user actions that can reveal the root cause of an incident. Without both pu...
Add Favorite
Back to Search Begin New Search