Introducing: Horizon Identity, OSINT In...
In today’s threat landscape, investigators can’t afford to spend hours stitching together scattered usernames, emails, and forum crumbs. Join ShadowDragon for one of the first public deep-dives into Horizon Identity™—the newest feature in ShadowDragon's Suite that turns fragmented digital traces into high-fidelity identity profiles in seconds. During this live session you will:See the speed: Watch a real-time walk-throu...
Next Generation Forms
Many organizations still rely on outdated form-filling experiences that fall short of the expectations of today’s modern users. With advancements in AI and digital platforms, it’s now possible to streamline data capture, improve user experiences, and ensure compliance—all at once. Join our complimentary webinar to explore how AI-driven and enhanced web-based technologies are transforming how organizations collect information....
Time Series Intelligence - Falkonry Spe...
Join this bootcamp to learn how to effectively remove most of the effort involved in exploiting telemetry and time series data to improve the resilience of your systems. In this bootcamp, attendees will learn about:organizing rules to manage alert dashboardsfundamental concepts of time series intelligenceestablishing alert criteria on telemetry data to trigger a workflowvisualizing and comparatively analyzing electrical and mechanical datainge...
Real Time Crime Centers Made Easy
Data-driven policing is changing the way law enforcement agencies protect their communities, and Real Time Crime Centers are the nerve center for providing officers with timely, accurate intelligence. By integrating community-owned cameras with law enforcement's own video security systems, learn how your agency can:Broaden the scope of its crime monitoringImplement collaborative crime-preventionWith tips and tricks from law enforcement veteran...
Mission Secure: Enabling OPORD 8600 Suc...
As OPORD 8600 establishes a clear mandate for securing data across Department of Defense (DoD) operations, organizations must adopt powerful, adaptable solutions, including robust data protection and advanced threat detection capabilities, to achieve compliance while supporting mission success. Join us to learn how Trellix Data Loss Prevention (DLP) and Endpoint Detection & Response (EDR) provide comprehensive visibility and control. Disco...
F5 ADC 3.0: Revolutionizing Application...
F5 Tech on Tap is back for 2025! Join F5, Red Hat, and Peraton for this interactive session highlighting how F5 ADC 3.0, F5 AI Gateway, and Red Hat technologies provide the tools you need to maintain resilience across an increasingly complex and expanding threat landscape. Discover how our solutions can empower you to: Combat Emerging AI Threats: Discover the F5 AI Gateway, a cutting-edge solution providing real-time resilience against emergin...
Boosting Federal Efficiency: Work Smart...
Federal agencies are increasingly turning to AI to streamline workflows, enhance productivity, and improve operations across departments, from procurement to cybersecurity. With real-world examples from agencies already putting AI to work, this session will highlight how Microsoft Copilot is helping modernize government processes. Join this webinar to learn how your agency can leverage Microsoft Copilot to boost efficiency and work smarter. Le...
Navigating Return-to-Office Mandates: W...
As organizations face return-to-office mandates, many are navigating a complex process involving leadership decisions, space planning, and employee needs. Join us for a complimentary webinar on how to better prepare for return-to-work requirements. The session will focus on the individuals responsible for managing this transition from start to finish equipping them with tools to inform all parties involved, share reports and data with leadersh...
When AI Learns to Breach and Quantum Le...
As public and private sectors accelerate AI adoption, they're deploying it atop cryptographic foundations built for a human-centric world. This results in a surge of non-human identities such as service accounts, agentic AI, machine-to-machine workflows, many authenticated by expired, weak or untracked keys. These digital actors now outnumber humans across critical systems and often hold far more privilege. When they fail or are exploited, the...
ATO in a Box: Simplify Your Compliance
Is your organization struggling with the high costs, lengthy timelines and uncertain results of the traditional Government Authorization to Operate (ATO) process? Join Ask Sage and Chainguard on June 26th for an exclusive session where we'll showcase how Ask Sage's ATO in a Box, powered by Chainguard’s secure containers and AI-driven automation, can revolutionize your compliance journey. Sign up for our virtual workshop to hear from our...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.