Archived Events
Attendees joined us at the 2025 Government Security Forum to gain intelligence, tools and real-world strategies needed to defend agencies against next-generation cyber threats.
They heard discussions led by industry experts, featuring:
Cyber threats targeting K-12 institutions continue to evolve, yet limited resources make it challenging to stay ahead. Situational awareness and proactive defense strategies are critical to ensuring security investments are directed where they matter most.
During this webinar, attendees ...
During our RevealX Hunter Challenge, attendees focused on solving a series of challenges, each differing in their level of difficulty and in the skills needed to solve the problem. They faced real world situations involving incident investigation, threat hunting, security and network hygiene, network performance and ...
̽»¨ÊÓÆµ’s Election Security Readiness Week took place during the week of August 12-15, 2024.
Here's what attendees experienced during this campaign:
Election Security Focused Sessions: We will be hosting various sessions from Monday, August 12 to Thursday, ...
The election infrastructure in the United States is decentralized and complex. This decentralization, while by design, has the side effect of an expanded attack surface for threat actors to exploit. At risk are voting systems and the integrity and availability of election ...
During our RevealX Hunter Challenge, attendees focused on solving a series of challenges, each differing in their level of difficulty and in the skills needed to solve the problem. They faced real world situations involving incident investigation, threat hunting, security and network hygiene, network performance and ...
Cyberuptive, ExtraHop, Gigamon and CrowdStrike welcomed attendees to learn our Joint Solution - Better Together - Our Mission to Stop Breaches with Improved Visibility and MTTR XDR/EDR/NDR/SIEM!
During this hands-on event, attendees learned how to:
Enhance their security ...
Public sector organizations wisely invested in Intrusion Detection Systems (IDS) to meet security requirements sufficient for the perimeter-based cyber threats of the time. However, ...
Government organizations face threats, like none other. Ensuring that a robust security posture fits inside the regulatory and budget requirements of any agency is a huge feat onto itself. Add on ...
Driven by rapid changes in the technology landscape and facing complex security objectives for their systems, federal agencies are developing modern solutions to prepare their systems for the next generation of cybersecurity ...