Upcoming Events
In this Dell Technologies Webinar Series, attendees will learn about:
AI & Generative AI
Edge & 5G
Cyber Security & Data Protection
Merging Legacy Virtualization & Cloud Native Development
Mission Critical ...
Identity risks are of increasing focus for government agencies, especially when it comes to Active Directory and Entra ID. Attack Paths accessed via synced users can cross environments and bypass important identity safeguards and security controls.
BloodHound Enterprise (BHE), a product of SpecterOps, ...
Join Dragos and Xage Security for an exclusive webinar on defending against sophisticated nation-state threats to critical infrastructure, highlighted by Volt Typhoon. Learn how to detect and counter advanced cyber adversaries in OT and IT-OT environments. This session ...
As businesses continue to adapt to hybrid work models and cloud environments, the need for a unified, secure, and scalable network solution has never been greater. In this exclusive webinar, we'll dive deep into Symantec Secure Access Service Edge (SASE) - a cutting-edge framework designed to bring together network ...
Introducing Zscaler Federal’s NEW Partner enablement series, APEX, designed exclusively for our most strategic and technically-focused partners.
Attendees joined Zscaler on the 3rd Thursday of every month for a new discussion, driven by customer use case and delivered with ...
Archived Events
Omnissa, ClearCube, and HP subject matter experts discussed their solutions and how new trusted zero clients connecting to Omnissa Horizon can help you with implementing your Zero Trust Endpoint strategy.
Subject-matter experts explored topics ...
Attendees joined for an exclusive webinar where F5’s Director of Solution Engineering, Corey Marshall, discussed how F5 approaches Zero Trust within the DoD and how enhancing API security is critical.
During this webinar, the following topics were ...
With calendar 2024 coming to a close, it’s a natural time to reflect on the cybersecurity mandates, policies and strategies that have shaped the last few years in government. One of the most impactful strategies has been Zero Trust.
As agencies continue to ...
Right now, Civilian, Defense and National Security agencies are focusing on zero-trust pillars. The public sector is undertaking foundational shifts in the approach to cyber and capability delivery that keep critical data, assets and infrastructure safe. During this webinar, attendees discovered how leading Systems ...
There is no one Zero Trust technology. Effective Zero Trust strategies utilize a mix of existing technologies and approaches, and it does not happen overnight – it is a journey. However, there are some basic principles that can help along the way.
Attendees joined CyberArk and ...