Archived Events
As the newest branch of the military, Space Force is quickly building out the infrastructure it needs to be an effective fighting force, which means rich opportunities for government contractors. Given that space is now a major warfare domain, Space Force needs robust command and control systems, resiliency, cybersecurity, ...
Attendees of this webinar better understand how Cortex XDR allows for:
Full visibility across network, Cortex endpoint, cloud, third party and identity sources, not just endpoint
Reduced mean time to detect (MTTD) and mean time to respond (MTTR)
Out-of-the-box ...
Zero Trust Architectures have become a focal point for the US Government in their efforts to improve the nation’s cybersecurity posture. Traditionally providing secure access to applications, including those hosted in the cloud, has forced agencies to make arduous compromises. They’ve needed to either sacrifice ...
In today's digital landscape, security is essential for resource and application deployments. Whether it's in private data centers or the public cloud, the complexity of cloud-native environments presents unique challenges. Rapid developer movements, fully automated workflows, and segmented security teams can lead ...
Attendees learned how Palo Alto Networks and World Wide Technology partner together to help customers:
Re-examine their security posture
Align their strategies
Implement an in-depth incident response plan to boost your defenses
Cybersecurity is in flux across the public sector, with traditional processes and tools proving inadequate for today's global threats. In response, the federal government has intensified efforts to secure mission-critical data through executive orders, department memoranda, and other official ...
Attendees of this immersive workshop, walked through:
Ways to augment Prisma Access, including URL Filtering, Threat Prevention and WildFire® malware prevention service
Key architectural considerations when planning and executing deployment
Basic service ...
From this webinar, we learned how to secure smart medical devices in your ecosystem using a Zero Trust approach! We had a great agenda lined up including several guest speakers, who shared their expertise and best practices in healthcare data management.
In this webinar attendees discussed:
The unseen ...
From this webinar, we learned how to secure the IoT devices in your ecosystem using a Zero Trust approach! We had a great agenda lined up including a fireside chat with Ryan Kramer, Enterprise Infrastructure Architect for the State of North Dakota, who shared his expertise and best practices in securing IoT ...
Organizations worldwide are in the midest of a massive wave of cybersecurity threats. According to the IDC, approximately 37% of global organizations said they were the victim of some form of ransomware attack in 2021 and the number of attacks continue to rise in 2022. As these attacks mature, it's ...