Exploiting the Everyday: Adversaries' A...
As IT systems and online services rapidly evolve, the risks facing organizations have expanded significantly. This shift is reflected in a changing threat landscape, where adversaries increasingly exploit cloud platforms and SaaS applications as part of their campaign playbooks. In this webinar, we'll explore the wide range of services, applications and tools leveraged by threat actors to bypass traditional defenses, with a focus on the ...
Containers Without Complexity: The Red...
Across Canada, government agencies are embracing new ways to modernize operations, innovate faster and build citizen trust. At the center of this shift is containerization, enabling IT teams to move beyond legacy systems and unlock the agility needed for today's digital demands.During this webinar, attendees learned how Red Hat OpenShift simplifies this transformation by providing a unified platform to deploy, secure and manage Kubernetes cont...
Simple, Cost-Effective Data Protection...
As Public Sector teams modernize IT, protecting workloads with a simple, cost-effective solution is essential. Red Hat, CloudCasa, and Carahsoft hosted an exclusive virtual event on September 24 to explore how Red Hat OpenShift and CloudCasa work together to deliver secure, scalable and low-cost data protection for virtual machines (VMs), containers and persistent volumes across OpenShift environments.Together, Red Hat and CloudCasa help agenc...
Optimize Mobile Asset Management with A...
Federal law enforcement agencies operate in fast-moving, complex environments where managing mobile assets — vehicles, field equipment, mobile IT systems — is critical to mission success.In this session, attendees learned how ServiceNow’s AI platform delivers real-time visibility, automates inventory tracking, and predicts maintenance needs to maximize asset readiness and security.Insights on using AI to predict maintenance n...
Education Cyber Resilience: A 4-Part Se...
Attendees joined us for an exclusive webinar series where Cisco and Proficio will explore today’s top cyber threats in education and how your institution can prepare. From real-world ransomware case studies to practical resilience planning, we’ll highlight proven strategies to strengthen security in both K–12 and higher education. Attendees gained insight into:Current threat trends in education, including ransomware-as-a-serv...
Safeguarding Your Data: Meeting CMMC Le...
Participants attended our Google Workspace CMMC webinar to learn how your organization can achieve CMMC Level 2 compliance and safeguard your sensitive data. With the upcoming accreditation requirements from the Department of Defense, it's more critical than ever for the Defense Industrial Base to secure Controlled Unclassified Information (CUI). Attendees joined us to learn about CMMC and why it's important, demonstrate how to leverage Google...
Strengthening Federal Cybersecurity wit...
In response to Executive Order 14028, federal agencies are accelerating their adoption of Zero Trust architectures to modernize and secure their IT environments. A critical yet often overlooked component of this transformation is Encrypted DNS, a foundational element that enhances visibility, control and resilience across distributed networks. During this webinar, Infoblox’s Chief DNS Architect, Cricket Liu, and Cybersecurity Strategist,...
Stronger Together: Modernizing Records...
Key topics include: “Why” – Applying lessons learned to state and local government challenges Benefits of adopting more Microsoft 365 tools for data governance Approach to implementing tools – Discover, Design, Migrate, Train, Maintain Tools available in the Microsoft 365 universe for data governance and security, including AvePoint add-on tools to improve functionality
A Blueprint to Defeat Social Engineerin...
A new social engineering-led threat is targeting IT Help Desks, and new strategies are required to defend against it. Gangs like Scattered Spider are honing their techniques and tools to exploit weaknesses in your security process and target institutions like yours with ransomware and data theft. Visionary CISOs are implementing novel defenses to fight back.During this webinar, attendees learned:What is the new social engineering threat?Which...
Unified Approach for Continuous Threat...
State and local governments and educational institutions face a growing challenge: securing interconnected IT and OT systems from modern cyber threats. Traditional siloed defenses are no longer enough. This webinar pertained to cybersecurity leaders ready to move beyond fragmented strategies and embrace a cohesive ‘whole-of-state’ approach. Attendees explored how to build a unified cybersecurity framework that leverages shared reso...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.