Upcoming Events
As Florida’s colleges and universities adapt to hybrid learning, remote work and increasing cyber threats, IT teams are being asked to do more with less. From phishing and ransomware to performance challenges and tool sprawl, the need for a unified security and access strategy is ...
In this webinar, attendees will:
Understand the advantages of Identity-First Zero Trust connectivity over traditional VPNs, IPSec tunnels, SD-WANs, and conventional ZTNA—especially for Non-Human Identity (NHI) and ICAM use cases
Gain deep insight into Zero Trust ...
Compliance is a cornerstone of any modern cybersecurity strategy, especially as agencies and organizations work toward implementing Zero Trust principles. Splunk's Compliance Essentials App simplifies the compliance process by providing tools to assess, monitor, and report on your environment's adherence to regulatory ...
Join Google Cloud Security and Dito for an immersive session exploring how security leaders and practitioners are reshaping their approach to cloud security in the age of AI and automation. Dito will share insights into today’s evolving threat landscape, showcasing how Google Cloud Security’s platform is being ...
Please join Carahsoft and Forescout for an informative and interactive session that will help you better understand how the use cases and capabilities of Forescout can help your California agency gain total device visibility and protection.
During this ...
Archived Events
How much is your legacy Hardware Security Module (HSM) infrastructure holding you back? Legacy HSMs were not designed for the evolving demands of today’s federal IT environments. Burdened by manual operations, limited scalability, and outdated architectures, these systems are costly to maintain, unable to meet the ...
In this webinar, attendees learned:
How to evaluate your organization’s current position on the security maturity scale
Actionable steps to reach NIST 800-171 standards
Essential practices for securing identities
Valuable insights on how to ...
Watch the on-demand webinar with Dragos and Xage Security, where we explored defending against sophisticated nation-state threats to critical infrastructure, including Volt Typhoon. Attendees discovered different strategies for detecting and countering advanced cyber ...
Attendees joined Google Security Operations (SecOps) and Arctiq for an immersive session exploring how security leaders and practitioners are reshaping their approach to cloud security in the age of AI and automation. Arctiq shared insights into today’s evolving threat landscape, showcasing how Google Cloud ...
As governments and educational institutions strive to meet demands for access to data-driven services, both internally and externally, they face the critical challenges of securing sensitive data against cyber threats. To address this challenge, government and educational institutions need to ...