Back to Search Begin New Search Save Search Auto-Notify
Exploited Vulnerabilities, the Threat A...
In this webinar, Patrick Garrity, Security Researcher at VulnCheck, dove into exploited vulnerabilities and explored which technologies are impacted, which threat actors are most active, and how quickly vulnerabilities are being exploited once disclosed. Understanding these dynamics is key to staying ahead of emerging threats and protecting your mission. Attendees joined VulnCheck on December 4th to discover:The most commonly exploited vulnera...
Add Favorite
Eliminate Network Blind Spots and Build...
The Forescout and Gigamon integration offers a flexible solution that centralizes network intelligence from multiple sources, empowering your Network and Security Operations Center. This minimizes blind spots, strengthens security hygiene and helps you better manage cyber risks. Attendees joined Ron and Nikhil for our discussion to learn how Forescout & Gigamon can: Identify All Devices: Learn how Forescout automatically identifies and tra...
Add Favorite
LA County Public Sector Webcast Series...
Attendees immersed themselves in the Salesforce ecosystem and discovered how to optimize the platform to meet the unique requirements of Los Angeles.
Add Favorite
Transform Reporting Experience for Tabl...
Tired of spending hours formatting Tableau reports? This webinar discussed how Pixel Perfect can help you generate print-ready, contextualized and sharable reports in seconds. Experts from USEReady share key insights into the tool's features, its enterprise value and real-world success stories. During this webinar, attendees learned:Contextualized Report Formatting: How Pixel Perfect simplifies formatting to create professional, boardroom-read...
Add Favorite
Unlock the Power of Your CMDB with Ivan...
Unlock the Power of Your CMDB with Ivanti Neurons for ITAMAttendees of this webinar learned:The full lifecycle of your devices from acquisition to disposalHow to monitor software licenses and usageHow to prevent over-licensing and ensuring compliance with vendor agreementsHow to make informed purchasing decisions based on accurate asset data and future needs
Add Favorite
5 Zero Trust Confessions: Fireside Chat...
There is no one Zero Trust technology. Effective Zero Trust strategies utilize a mix of existing technologies and approaches, and it does not happen overnight – it is a journey. However, there are some basic principles that can help along the way.Attendees joined CyberArk and Optiv + ClearShark's leaders on December 5th as they shared insights and "confessions" into implementing Zero Trust security principles, emphasizing that it’s...
Add Favorite
Meeting Network Analysis & PCAP Requirements
Trellix Network Security won the NAVWAR Cybersecurity Challenge at identifying never-seen-before (“signature-less”) attacks by observing network activity. It also received the Gold Globe Cyber Security Global Excellence Award for Network Detection & Response (NDR).Think of “NDR” as a sibling to “Endpoint Detection & Response (EDR)” working together to detect threats and optimize the response to incid...
Add Favorite
Reimagining Digital Efficiency: A Bluep...
Atlassian's System of Work and Agency Implementation can streamline agency operations, improve efficiency and enhance services. In Part 1 on Thursday, December 5th, attendees learned about the core principles of the System of Work, real-world examples and how to apply Atlassian solutions to your specific agency challenges. In Part 2 on Thursday, December 12, learned practical aspects of implementing Atlassian tools including best practices for...
Add Favorite
The Low-Down: Network & Cloud Security...
In this Juniper Networks & Carahsoft webinar, we explored the critical aspects of network and cloud security for SLED organizations. Attendees also learned how to design and implement robust security measures to safeguard your sensitive data and systems. In this webinar, attendees heard Juniper SME's discuss:Introduction to Network and Cloud Security: Gain an understanding of the importance of a well-designed security architecture in prote...
Add Favorite
Accelerate App Development with GenAI
No-Code/Low-Code application development is continuing to grow and be a critical capability across the U.S. Federal government to help deliver mission impact more quickly and efficiently. What if we could accelerate the impact Low-Code is already making to mission initiatives? ServiceNow Generative AI capabilities do exactly that by streamlining the more complex development processes into easy-to-use interactions. Attendees learned more about...
Add Favorite
Back to Search Begin New Search