Archived Events
Email continues to be the primary vector for initiating malicious activity. Proofpoint is uniquely positioned to reference, with data and evidence, both named activity sets (threat actors) and macro trends observable across the landscape as a ...
Attendees joined us for an exclusive webinar to explore how Google Workspace empowers federal agencies to work smarter and faster. From real-time collaboration and intelligent automation to built-in data analysis and streamlined communication, Workspace is designed to simplify complexity and unlock higher performance ...
As government agencies navigate evolving return-to-office mandates, leaders face a dual challenge: ensuring compliance while driving efficiency in facility operations. In this session, we'll be exploring how workplace technologies can support these goals by leveraging workplace technologies ...
Featured Speakers:
David Thomas, DISA Major Account Manager, F5
Peter Scheffler, Senior Cyber Security Solutions Architect, F5
Tim Ryan, Senior Account SA, Red Hat
F5, Red Hat, and Peraton hosted ...
In this webinar, attendees learned how to:
Incorporate paper to cloud solutions by eliminating paper archives, transforming paper processes and enabling electronic records to create searchable cloud-based knowledge repositories
Streamline processes and drive smarter decisions ...
An interactive session focused on protecting critical infrastructure in the utilities sector. We’ll kick things off with quick introductions and an overview of what to expect. Then, the FBI will share the latest on threats and trends they're seeing, including real-world examples of ...
Government cybersecurity investments are under greater scrutiny than ever.
Attendees learned:
How Qumulo Stratus enables zero-trust isolation and tenant-level control for mission-critical environments
Why shared-nothing architecture outperforms legacy shared-everything models for secure, multi-tenant workloads
Ways to implement quantum-safe cryptography and ...
Gartner presented the SOC Visibility Triad of capabilities (EDR, NDR and SIEM) as foundational capabilities for a SOC team to acquire to be as effective as possible; however, there are hidden assumptions baked into the SOC Visibility Triad that resulted in deployments being vulnerable and sitting on cracked foundations ...
Government agencies at every level—federal, state, and local—face mounting cybersecurity challenges: increasingly sophisticated threats, evolving compliance mandates, limited IT resources, and ongoing pressure to ensure the continuity of public ...