DNS Under Siege: Unmasking the Infrastr...
In today’s threat landscape, DNS is no longer just the phonebook of the internet. It’s a battleground. Threat actors are exploiting DNS with unprecedented speed and sophistication, leveraging ephemeral domains, traffic distribution systems (TDS), domain hijacking and adversarial AI to evade detection and scale attacks. Attendees of this webinar learned about:The rise of one-time-use domains and their role in control evasionHow mali...
Vulnerability Management 101
During this on-demand webinar attendees learned:The importance of basic cybersecurity hygiene. The intersection of vulnerability management and MITRE ATT&CKHow vulnerability management plays a role with various standards and frameworks
Learn How to Achieve CMMC Compliance wh...
Ariento was a leading provider of managed, consulting, and advisory services to the defense industrial base related to the Cybersecurity Maturity Model Certification (CMMC). While not required, CMMC Level 2 certification demonstrated their commitment to their managed service clients and assisted in making their certification assessments easier and more cost effective. On Tuesday, October 21 from 1:00 – 1:30 pm, BeyondTrust’s Kevin...
CMMC Better Together Webinar Series: Sh...
Carahsoft and our partners came together to host our 2025 CMMC “Better Together” Webinar Series: Shared Responsibility for Sustainable Compliance. The goal of this series was to bring together leading integrated solutions providers to explore how collaborative, end-to-end strategies can help members of the U.S. Defense Industrial Base (DIB) achieve and sustain compliance with the Department of Defense’s Cybersecurity Maturity...
IAM Unpacked: A Guided Tour of the Plat...
In this webinar, attendees moved beyond theory with a live, hands-on demonstration of the IAM platform. Through a real-world use case, the webinar showcased how IAM streamlines collaboration, automates workflows, and enforces compliance while reducing administrative burden and providing a secure, centralized source of truth for agreements.Attendees discovered:A guided demo of IAM's core features designed for public sector needs.How IAM simplif...
Protecting What Matters: Mastering PDF...
In an increasingly digital world, protecting sensitive information is more important than ever. This webinar will guide you through the powerful document security tools available in Adobe Acrobat Pro DC - helping you control who can view, edit, copy, or print your content. Whether you're working with internal teams or external partners, Adobe Acrobat gives you the tools to stay in control of your documents. Explore how Adobe Acrobat Pro enable...
From Bureaucracy to Breakthroughs: Acce...
The Pentagon’s bold move to dismantle its sluggish bureaucracy unlocks a new era of rapid innovation. Our panel discussion, featuring high-ranking military personnel and advisors to Latent AI, revealed how this shift accelerates advanced and innovative capabilities like edge AI to federal agencies, enabling real-time, secure decision-making for mission success. Attendees got to:Explore strategies that strengthen collaboration between ind...
Turbocharge Your Agencys Success with D...
Delegated application development on the ServiceNow AI platform can break through some of the most pressing challenges within public sector organizations: complex IT processes, limited resources, and slow development cycles that struggle to adapt to the changing demands of their missions. In this Tech Talk, we showed attendees how to break the backlog, safeguard development, and unleash innovation. ServiceNow offers a low-code/no-code applicat...
Transforming Healthcare Claims Oversigh...
Thank you for your interest in the Qlik and ASHLIN webinar: Transforming Healthcare Claims Oversight: Detect Fraud Early, Mitigate Risk, and Maximize Audit Efficiency with Qlik’s AI-powered Tools. During this webinar, attendees will learned about:Quickly identifying states and providers with financial exposure from claim inaccuraciesInvestigating flagged claims and instantly validating billing policies using Qlik Answers, powered by offi...
Smarter, Safer, Simpler: How Education...
Autonomous Endpoint Management (AEM) delivers the speed, visibility, and automation your team needs to stay ahead of threats, simplify regulatory demands, and support a safe, seamless learning environment.Attendees learned about:Rapid insight into every endpoint across your environmentEasier compliance with FERPA, GLBA, COPPA, and other standardsFaster patching and risk mitigation through automationClearer, data-driven conversations with leade...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.