Upcoming Events
Please join ̽»¨ÊÓÆµ and Forescout for an informative and interactive session that will help you better understand how the use cases and capabilities of Forescout can help your California agency gain total device visibility and protection.
During this ...
Compliance is a cornerstone of any modern cybersecurity strategy, especially as agencies and organizations work toward implementing Zero Trust principles. Splunk's Compliance Essentials App simplifies the compliance process by providing tools to assess, monitor, and report on your environment's adherence to regulatory ...
Generative AI tools like ChatGPT have transformed how government organizations access information and enhance productivity. However, their adoption raises critical concerns about safeguarding sensitive data and maintaining compliance.
In this insightful webinar, Zscaler will demonstrate how to provide your users ...
Archived Events
In this webinar, attendees:
Understood the advantages of Identity-First Zero Trust connectivity over traditional VPNs, IPSec tunnels, SD-WANs, and conventional ZTNA—especially for Non-Human Identity (NHI) and ICAM use cases
Gained deep insight into Zero Trust principles, ...
How much is your legacy Hardware Security Module (HSM) infrastructure holding you back? Legacy HSMs were not designed for the evolving demands of today’s federal IT environments. Burdened by manual operations, limited scalability, and outdated architectures, these systems are costly to maintain, unable to meet the ...
In this webinar, attendees learned:
How to evaluate your organization’s current position on the security maturity scale
Actionable steps to reach NIST 800-171 standards
Essential practices for securing identities
Valuable insights on how to ...
Watch the on-demand webinar with Dragos and Xage Security, where we explored defending against sophisticated nation-state threats to critical infrastructure, including Volt Typhoon. Attendees discovered different strategies for detecting and countering advanced cyber ...
Attendees joined Google Security Operations (SecOps) and Arctiq for an immersive session exploring how security leaders and practitioners are reshaping their approach to cloud security in the age of AI and automation. Arctiq shared insights into today’s evolving threat landscape, showcasing how Google Cloud ...
As governments and educational institutions strive to meet demands for access to data-driven services, both internally and externally, they face the critical challenges of securing sensitive data against cyber threats. To address this challenge, government and educational institutions need to ...
Healthcare data is under siege. As attacks escalate in frequency and impact, ransomware and data breaches aren’t just IT issues; they’re business, operational and trust issues across the healthcare ecosystem. Patient safety, care delivery, member privacy and regulatory ...