̽»¨ÊÓÆµ

̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Archived Events

Print-Gigamon-Orange-Logo.png
Gigamon Virtual Event

Event Date: March 13, 2024
Hosted By: Gigamon & ̽»¨ÊÓÆµ
Threat actors conceal lateral movement and data extraction within encrypted communications, making it incredibly difficult to detect when they are present. Gigamon Precryption™ technology is a breakthrough approach to increasing network ...
Print-Gigamon-Orange-Logo.png
Gigamon Virtual Event

Event Date: February 21, 2024
Hosted By: Gigamon & ̽»¨ÊÓÆµ
Hybrid cloud infrastructure is complex and time-consuming to secure, manage and maintain. Modern organizations must contend with multiple cloud providers and a myriad cloud, security, ...
Print-Gigamon-Orange-Logo.png
Gigamon Virtual Event

Event Date: February 07, 2024
Hosted By: Gigamon & ̽»¨ÊÓÆµ
Threat actors conceal lateral movement and data extraction within encrypted communications, making it incredibly difficult to detect when they are present. Gigamon Precryption™ technology is a breakthrough approach to increasing network ...
Print-Gigamon-Orange-Logo.png
Gigamon Virtual Event

Event Date: December 19, 2023
Hosted By: Gigamon & ̽»¨ÊÓÆµ
One of the challenges facing public sector organizations, such as U.S. and international government agencies, is the inability to carry IT gear from one place to another to ensure security and compliance. Many of these organizations have ...
Print-Gigamon-Orange-Logo.png
Gigamon Virtual Event

Event Date: November 30, 2023
Hosted By: Gigamon & ̽»¨ÊÓÆµ
The Zero Trust journey needs to start with a sound strategy. Regardless of which Zero Trust model you are utilizing, there are some universal solutions that will be common amongst them. Threat actors are observed using the same tactics and ...
SumoLogic-Microsite-Logo.png
Multi-Vendor Virtual Event

Event Date: November 02, 2023
Hosted By: Gigamon, Sumo Logic & ̽»¨ÊÓÆµ
Modernizing applications and migrating to public cloud platforms enhance agility and flexibility. But there are also trade-offs to consider, including new and borderless attack surfaces, lack of consistent visibility, and growing tool sprawl ...
Print-Gigamon-Orange-Logo.png
Multi-Vendor Virtual Event

Event Date: October 17, 2023
Hosted By: Gigamon, Armis & ̽»¨ÊÓÆµ
When most people think about connected devices, they think smartphones or tablets, but that's just the tip of the iceberg. All kinds of smart devices and sensors are connected to your network. Protecting your network isn't easy, but it's made more challenging when you don't have ...
Armis-microsite.png
Multi-Vendor Onsite Event

Event Date: October 12, 2023
Hosted By: Armis, Gigamon & ̽»¨ÊÓÆµ
Armis, Gigamon and ̽»¨ÊÓÆµ completed a hands-on experience in the Armis platform, which will help you understand the ease of use, simplicity, and business value for your organization when responding to critical cyber incidents.  The session dove into the intersection of Operational Technology (OT), ...
Print-Gigamon-Orange-Logo.png
Gigamon Virtual Event

Event Date: May 31, 2023
Hosted By: Gigamon & ̽»¨ÊÓÆµ
Network blind spots prevent Zero Trust deployment from being successful due to the lack of visibility into network telemetry. As the network grows and evolves, this pain will worsen if not addressed at the foundational ...
Maintain OMB M-21-31 Compliance with the Help of LiveAction
Multi-Vendor Virtual Event

Event Date: March 21, 2023
Hosted By: LiveAction, Gigamon & ̽»¨ÊÓÆµ
̽»¨ÊÓÆµ invited LiveAction CTO and Founder John Smith, and Gigamon Senior Sales Engineer Matt Hollingsworth, for a joint webinar on March 21st at 2pm EST where attendees learned: White House Executive Order and Memorandums on Zero Trust and OMB M-21-31 Definition of Zero Trust and its ...

Resources


Absolute Software & NIST Cybersecurity Framework
Datasheet

Absolute Software & NIST Cybersecurity Framework

How does Absolute Software stack up against the five pillars of the NIST Cybersecurity Framework: Identify, Protect, Detect, Respond, and Recover


Fill out the form below to view this Resource.