Upcoming Events
With calendar 2024 coming to a close, it’s a natural time to reflect on the cybersecurity mandates, policies and strategies that have shaped the last few years in government. One of the most impactful strategies has been Zero Trust.
As agencies continue to ...
Right now, Civilian, Defense and National Security agencies are focusing on zero-trust pillars. The public sector is undertaking foundational shifts in the approach to cyber and capability delivery that keep critical data, assets and infrastructure safe. Join us to discover how leading ...
Protecting APIs transcends the defense of individual software components—it’s about preserving the integrity of an entire ecosystem. Furthermore, the Department of Defense (DoD) has mandated the implementation of Zero Trust architecture to ensure that all resources are accessed securely, regardless of location ...
Join Dragos and Xage Security for an exclusive webinar on defending against sophisticated nation-state threats to critical infrastructure, highlighted by Volt Typhoon. Learn how to detect and counter advanced cyber adversaries in OT and IT-OT environments. This session ...
Introducing Zscaler Federal’s NEW Partner enablement series, APEX, designed exclusively for our most strategic and technically-focused partners.
Attendees joined Zscaler on the 3rd Thursday of every month for a new discussion, driven by customer use case and delivered with ...
In this Dell Technologies Webinar Series, attendees will learn about:
AI & Generative AI
Edge & 5G
Cyber Security & Data Protection
Merging Legacy Virtualization & Cloud Native Development
Mission Critical ...
Archived Events
There is no one Zero Trust technology. Effective Zero Trust strategies utilize a mix of existing technologies and approaches, and it does not happen overnight – it is a journey. However, there are some basic principles that can help along the way.
Attendees joined CyberArk and ...
The Forescout and Gigamon integration offers a flexible solution that centralizes network intelligence from multiple sources, empowering your Network and Security Operations Center. This minimizes blind spots, strengthens security hygiene and helps you better manage cyber ...
As the digital transformation of the judiciary accelerates, courts are increasingly reliant on technology to administer justice efficiently and securely. However, this reliance brings heightened cybersecurity risks, necessitating robust defense mechanisms to protect sensitive data and maintain the integrity of judicial ...
Attendees for Converge joined Tanium in Orlando, Florida, or online for four days filled with captivating keynote sessions, enlightening breakout workshops, hands-on technical labs, and certification opportunities.
During this event, attendees united with a multitude of IT and ...