Archived Events
Attendees who joined this webinar learned about:
Zero trust as it applies to federal agency cybersecurity
The role integrity plays in enforcing a zero trust approach
Methods for achieving integrity using file integrity monitoring (FIM) and security configuration management ...
View this webinar to learn more about:
Recent developments such as Mark-of-the-Web
Microsoft security controls including trust settings and decision flows
Tactics for gaining initial access, lateral movement, and long-term persistence
During this webinar attendees learned about:
Navigating the unique data landscape: classification, CUI, NATO STANAG and metadata standards
Beyond single methods: why a varied approach is essential for Outlook and Office data labeling and tagging
Harmonizing end user input AI, and ...