Upcoming Events
Join Dragos and Xage Security for an exclusive webinar on defending against sophisticated nation-state threats to critical infrastructure, highlighted by Volt Typhoon. Learn how to detect and counter advanced cyber adversaries in OT and IT-OT environments. This session ...
Introducing Zscaler Federal’s NEW Partner enablement series, APEX, designed exclusively for our most strategic and technically-focused partners.
Attendees joined Zscaler on the 3rd Thursday of every month for a new discussion, driven by customer use case and delivered with ...
Omnissa, ClearCube, and HP subject matter experts will discuss their solutions and how new trusted zero clients connecting to Omnissa Horizon can help you with implementing your Zero Trust Endpoint strategy.
Join us as we explore topics ...
In this Dell Technologies Webinar Series, attendees will learn about:
AI & Generative AI
Edge & 5G
Cyber Security & Data Protection
Merging Legacy Virtualization & Cloud Native Development
Mission Critical ...
Archived Events
Attendees joined for an exclusive webinar where F5’s Director of Solution Engineering, Corey Marshall, discussed how F5 approaches Zero Trust within the DoD and how enhancing API security is critical.
During this webinar, the following topics were ...
With calendar 2024 coming to a close, it’s a natural time to reflect on the cybersecurity mandates, policies and strategies that have shaped the last few years in government. One of the most impactful strategies has been Zero Trust.
As agencies continue to ...
Right now, Civilian, Defense and National Security agencies are focusing on zero-trust pillars. The public sector is undertaking foundational shifts in the approach to cyber and capability delivery that keep critical data, assets and infrastructure safe. During this webinar, attendees discovered how leading Systems ...
Backups are your last line of defense against ransomware attacks. By having your data saved separate from your organization, you can create a gap between an attack and sensitive data, allowing you to quickly recover. However, backups are only as good as they are being verified. Attendees joined Bocada and Carahsoft for a ...
There is no one Zero Trust technology. Effective Zero Trust strategies utilize a mix of existing technologies and approaches, and it does not happen overnight – it is a journey. However, there are some basic principles that can help along the way.
Attendees joined CyberArk and ...
The Forescout and Gigamon integration offers a flexible solution that centralizes network intelligence from multiple sources, empowering your Network and Security Operations Center. This minimizes blind spots, strengthens security hygiene and helps you better manage cyber ...