• https://www.gotostage.com/channel/944067f7f6dd47b4bb83bf0c090dffbe/recording/6ea0be1649a34361aac70038862bda41/watch

      Nov 30, 2023 | Cybersecurity

      Security teams are hampered by a wide array of factors that make vulnerability remediation a challenge. Threat Thursdays are a technical trainings taught by technical people to better understand the challenges facing public sector organizations. This training focused on lessons learned from the Capital One breach.

    • October News from immixGroup 2023

      Issue 157 | Oct 2023 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

    • September News from immixGroup

      Issue 156 | Sep 2023 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

    • August News from immixGroup

      Issue 155 | Aug 2023 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

    • July News from immixGroup

      Issue 154 | Jul 2023 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

    • June News from immixGroup

      Issue 153 | Jun 2023 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

    • May News from immixGroup

      Issue 152 | May 2023 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

    • April News from immixGroup

      Issue 151 | Apr 2023 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

    • Selling cyber means understanding FITARA

      Apr 25, 2023 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

    • Ransomware Resiliency: Identify, Prevent and Defend

      Apr 20, 2023 | Cybersecurity

      This event featured technology leaders from government, education and industry sectors. Topics included understanding threat data, infrastructure and vulnerabilities, workforce, human factor and breaches, zero trust security infrastructure attack surface and pathways, an public sector best practices.
       

    • March News from immixGroup

      Issue 150 | Mar 2023 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

    • February News from immixGroup

      Issue 149 | Feb 2023 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

    • December News from immixGroup

      Issue 148 | Dec 2022 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

       

         

      • November News from immixGroup

        Issue 147 | Nov 2022 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

      • October News from immixGroup

        Issue 146 | Oct 2022 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

      • Women in cybersecurity

        Oct 19, 2022 | Cybersecurity

        According to a recent survey on women in the field of cybersecurity, men outnumber women three to one.  However, the percentages of women in key cybersecurity leadership positions are increasing.  Currently, in America, there are 714,548 unfilled cybersecurity positions. The need to educate and raise up the next generation of cyber defenders is paramount. In support of this year’s NIST NICE Cybersecurity Career Awareness Week, enjoy this webinar discussion on “Women in cyber.”

      • September News from immixGroup

        Issue 145 | Sep 2022 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

      • August News from immixGroup

        Issue 144 | Aug 2022 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

         

      • July News from immixGroup

        Issue 143 | Jul 2022 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

      • June News from immixGroup

        Issue 142 | Jun 2022 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

      • May News from immixGroup

        Issue 141 | May 2022 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

      • April News from immixGroup

        Issue 140 | Apr 2022 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

      • Déjà vu all over again: How to prepare for CVE announcements webinar

        Mar 31, 2022 | Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

        Secure software development isn’t always a top concern to the business unless you are in a highly regulated industry. Today, time to market is often more important than security, increasing the value of the product that you sell with continuous improvement and quick software releases. To create and maintain a lead on the competition, you have to be really good at Agile and DevOps. That’s where immixGroup and Checkmarx come in.

      • March News from immixGroup

        Issue 139 | Mar 2022 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

      • The Enterprise Approach to Unified Endpoint Management and Security

        Find out why point solutions don't work, and the advantages of a Tanium enterprise solution when it comes to management and security.

      • How to help agencies fund critical IT modernization projects

        Feb 23, 2022 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

      • February News from immixGroup

        Issue 138 | Feb 2022 | , BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

         

           

        • Palo Alto Zero Trust Webinar

          Jan 27, 2022 | Cybersecurity, State & Local

          Watch this immixGroup webinar sponsored by CDWG where you will learn from Palo Alto Networks experts how to achieve Zero Trust for private cloud security. You will also discover how to take a pragmatic approach to implementing Zero Trust architectures for enterprise data centers.

        • January News from immixGroup

          Issue 137 | Jan 2022 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

        • NetScout Connect360 Federal partner program

          Dec 15, 2021 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

          NetScout is excited to announce the launch of our enhanced federal partner program – Connect360 partner program for U.S. Federal. This program is designed to deliver new avenues of revenue to enable you to further grow your business through aggressive discounts on deal registration, strong renewal rates, certification training and more!

        • December News from immixGroup

          Issue 136 | Dec 2021 | BigData and Analytics, Business and Operations, Cloud Computing, Cybersecurity, Enterprise Mobility, Industrial Technology, IT Infrastructure, State & Local, CDM,

        • November news from immixGroup

          Issue 135 | Nov 2021 | Business and Operations, Cybersecurity, Enterprise Mobility, IT Infrastructure, State & Local

        • The Executive Order and Zero Trust webinar with BGT and Forcepoint

          Jul 22, 2021 | Cybersecurity

          Find out how your company can implement Zero Trust solutions in this webinar featuring Braxton-Grant Technologies and Forcepoint.

        • The Executive Order and Zero Trust webinar with BGT and Forcepoint

          Jul 21, 2021 | Cybersecurity

          Register today for this webinar to learn more about launching Zero Trust solutions with Braxton-Grant Technologies and Forcepoint

        • Monitoring for Remote Workforce

          Aug 6, 2020 | Cybersecurity

          Join immixGroup and Veriato to hear about how the pandemic is driving a surge in the use of Remote Monitoring Software, for employees working from home.

        • The Definitive Guide to Federal Protection

          Explore how to take a proactive stance on data protection—and why it’s the safe choice for agencies today in Forcepoint's latest whitepaper.

        • Barracuda CloudGen Firewall

          Learn how Barracuda Networks can help provide reliable and secure ways to connect home offices with enterprise applications.

        • Secure Your OT Environment

          Apr 28, 2020 | Cybersecurity, IT Infrastructure

          Attend this webinar with Gigamon and ClearShark to learn how to gain visibility into your operational environment to keep your OT network secure, efficient and cost effective.

        • Prisma Access Business Continuity and Enabling a Secure Mobile Workforce

          Mar 26, 2020 | Cybersecurity

          Watch this webinar to learn more about Palo Alto Networks customized offerings that are easy to consume, purchase and deploy.

        • McAfee MVISION Federal Overview

          Aug 30, 2018 | Cybersecurity, IT Infrastructure

          In this webinar, learn about the new McAfee MVISION portfolio that’s focused on making its products even more interoperable with third-party solutions and multiple platforms. 

        • Security Metrics That Matter

          Apr 24, 2018 | Cybersecurity

          Join RedSeal to learn how its solutions platform identifies cyber defensive gaps and runs continuous penetration tests to give stakeholders the understandable and actionable metric they need to drive toward resilience.

        • Analyzing the Modernizing Government Technology (MGT) Act and its Impact on Federal Cybersecurity Programs

          Jul 11, 2017 | BigData and Analytics, Cybersecurity

          Join Cameron Chehreh, Vice President and Chief Technology Officer at Dell EMC Federal, and Chris Brazdziunas, Vice President of Products at LogRhythm, as they examine the impacts of MGT Act on federal cyber security programs and capabilities

        • Defensive Cyber Operations – What Do You Need to Think About?

          Jun 29, 2017 | Cybersecurity

          2017 brings major changes to the way the DOD conducts Defensive Cyber Operations, both tactically and strategically. Watch this webinar to learn how you can adapt to the changes and be prepared.

        • President Trump’s Cybersecurity Executive Order and what agencies need to do to respond

          Jun 27, 2017 | Cybersecurity

          On May 11th, 2017, the President issued his Executive Order on strengthening cybersecurity and protecting the country’s digital infrastructure. Join RedSeal and GuidePoint Security as they review the EO and advise on how to effectively address the highest cybersecurity risks.

        • Gain visibility and secure network access to prevent emerging threats

          May 25, 2017 | Cybersecurity

          Join Pulse Secure in this webinar to learn strategies for tackling growing challenges government agencies face with connected internet of things devices and emerging cybersecurity threats, while also trying to provide easy access to data.

        • Threat Spelunking: Combining data-centric and endpoint hunt models for more effective threat hunting in Splunk

          May 2, 2017 | Cybersecurity

          Infocyte and Splunk have partnered to offer Splunk users a fully comprehensive threat hunting solution that combines the best of data-centric hunting provided by Splunk and agentless endpoint hunt capabilities offered by Infocyte. By combining the two solutions, Splunk users benefit from a proven and defined hunt workflow that reduces time-to-detection and eases hunter skillset requirements.

        • HPE Data Security webinar

          May 1, 2017 | Cybersecurity

          The challenge all organizations face with encryption solutions today is that you must decrypt your data before you use it.

        • HPE/Aruba Federal (Partner Ready for Networking Program) Review

          Nov 30, 2016 | Cybersecurity

          Watch this webinar to hear more about the new HPE FEDERAL Partner Ready for Networking Program and how you can benefit from an enhanced go-to-market model with greater margin opportunities for new business and mobile competencies. This review is specific to the FEDERAL market and is a separate program from the commercial model.

        • Windows 10: Managing Native Encryption with McAfee

          Nov 29, 2016 | Cybersecurity

          McAfee MNE (Management of Native Encryption) offers Windows 10 users the ability to reduce complexity by leveraging their current infrastructure to manage Native Encrytion (Bitlocker). Moreover, this reduces TCO, increases automation and streamlines processes for cyber professionals in the DoD.

        • Solving Data Privacy and Compliance Challenges with EnForce Risk Manager

          Oct 18, 2016 | Cybersecurity

          Every organization or agency has some form of sensitive information.  Whether that information is in the form of trade secrets or classified data, there is a strong need to manage and protect sensitive information at every stage of its lifecycle, especially in light of data breaches, data loss, and increasingly complex privacy regulations.  Learn how to proactively identify, categorize, and remediate sensitive and private information with Guidance Software’s newest product – EnForce Risk Manager.

        • Disruption Ahead: Applying Machine Learning for High Speed Network Security

          Aug 23, 2016 | Cybersecurity

          Traditional security tools are struggling to keep pace with the speed and volume of advanced, never-before-seen cyber threats hitting the network. Most compromises are detected first by third-parties, often months after an initial breach. Learn how a machine-learning solution can scan all network traffic at wire speed to detect, investigate and remediate advanced, “unknown” malware before damage is done.

        • Securing Hybrid Infrastructures

          Jun 28, 2016 | Cybersecurity

          Do you lack full security visibility across hybrid infrastructures? Do you lack the capability to sufficiently protect the data center and the cloud? Do you have challenges identifying and blocking today’s advanced threats? In this webinar, you will learn how Intel Security provides customers security and visibility of workloads on- and off-premises through security solutions that 1.) Protect physical, virtual, and cloud infrastructures 2.) Detect advanced targeted attacks, and 3.) Correct infected servers, storage, and networks. With centralized management, our customers improve visibility into their IT security posture for faster remediation and reporting to reduce risk and cost.

        • How to Mitigate Lateral Movement of Malicious Activity

          Jun 23, 2016 | Cybersecurity

          Despite record setting spending in the security space, data breach numbers are exploding. Today's cyber security landscape demands that we look beyond breach prevention, focusing more of our efforts on mitigating access, early detection, and quick response times.

           

        • Federal Cybersecurity Update: From Cyber Sprint to CSIP Marathon

          May 3, 2016 | Cybersecurity, CDM

          Learn best practices for how agencies are protecting our Nation’s critical infrastructure in the face of increasingly sophisticated and persistent cyber threats.

        • Mind the Gaps: Understanding the NCPS

          Apr 26, 2016 | Cybersecurity

          Join this live Webinar to learn about the National Cyber Protection System (NCPS), current compliance issues, and what security issues remain after NCPS deployment.

        • Puppet: Security and Compliance

          Apr 12, 2016 | Cybersecurity

          Security breaches and the demand of regulatory policies make compliance and quickly addressing security vulnerabilities harder than ever before. Watch this webinar to learn to define and deploy policies across all systems, continuously monitor drift, gain visibility to prove compliance, and more.

        • Optimizing End Point Protection with Intel Security

          Feb 24, 2016 | Cybersecurity

          Watch this webcast and come away with details on how you can speed detection and remediation response times with McAfee End Point Security, use Intel Security’s connected architecture to strengthen and accelerate the threat defense lifecycle, and more. 


           

        • Securely Archive Data in Today’s Federal Organization

          Jan 28, 2016 | Cybersecurity

          Learn how your organization can easily and securely archive data, maintain regulatory compliance, and meet eDiscovery requirements. In under one hour get details on benefits with archiving in the cloud, eDiscovery, and more.

          • How to Get the Most Out of Your Cyber Security Professionals’ Time

            Oct 22, 2015 | Cybersecurity

            How much of a high value cyber security professional’s time is spent on activities that are not improving the security posture of the enterprise? How do federal agencies make sure the most important vulnerabilities, patches and remediations are focused on first?  

             

          • Breaking the Cyber Attack Kill Chain

            Apr 30, 2015 | Cybersecurity

            With a constantly changing threat landscape how can we prevent, detect, and mitigate these advanced attacks? This on-demand Webinar lets gives you an understanding of how to address these advanced targeted attacks.

          • Managing the Risks of the Insider Threat

            Apr 28, 2015 | Cybersecurity

            In order to properly manage an organization’s information security program, the threat landscape must be assessed and understood.  This on-demand Webinar focuses on internal threats and how an organization can identify and manage the risks resulting from these internal threats.

          • Cyber Range: Better Defense, Better Training, Better Cybersecurity

            Mar 31, 2015 | Cybersecurity

            Results show that testing new cyber technologies takes 10 to 20 times longer without a Cyber Range, yet the value of using a Cyber Range has not been fully realized by many Defense agencies due to slow adoption. Learn about how the value in training, technology utilization and maturing of process and procedures in a Cyber Range can increase efficiency and effectiveness of your resources.

          • Why You Need Cybersecurity Visibility, Automation, and Centralization

            Mar 26, 2015 | Cybersecurity

            Let’s face it, there are better ways to close the security gaps that exist throughout our environments. CSG Invotas identifies three methods: radically altering our perception of our existing environments, getting a better view of your enterprise by rigorously monitoring interaction data for suspicious activity beyond known threats, and lastly segmenting your Security Visibility by zones based on predictable patterns to help fully utilize your new perspective while securing based on your business needs.

          • ABAC - The Convergence of API Security and Identity Management

            Mar 19, 2015 | Cybersecurity

            As agencies and organizations increase access to services and applications, the need for access control and enforcement has become critical. This can be a challenging and complex task. In this webinar, you will learn how API gateway technology simplifies Role Based, Content Based, and Attribute Based Access Control to provide a secure, centralized point of enforcement.

          • Operation Archangel: Live Report on Research into Hacker Network in Asia-Pacific Region

            Feb 25, 2015 | Cybersecurity

            For twelve months Intel Security labs observed and analyzed  Archangel, a  live hacking network in Asia Pacific. This network was able to access information on ally embassies, ally military, and US military contractors in the Asia Pacific Theatre. After studying this threat's techniques, Intel Security demonstrated how this research was conducted & what preventive measures needed to be taken in order to mitigate an advanced threat such as this.

          • Gain Visibility and Control Over Your Cloud Infrastructure

            Feb 24, 2015 | Cloud Computing, Cybersecurity

            Virtual private cloud (VPC) offerings, like those from Amazon Web Services, give organizations great flexibility not only for computing, but also to deploy new network infrastructure quickly. However, the nature and speed of these deployments can leave you wondering who has access to your data and are your security policies in compliance.

          • Advanced Threat Hunting: Identify and Track Zero-Day Attacks Infiltrating Your Agencies

            Feb 11, 2015 | Cybersecurity

            Attacks are highly sophisticated, well-funded and persistently targeting enterprise environments. Perimeter security is no longer effective at preventing these types of threats, as attackers easily and efficiently land on company endpoints. Because of this, there are really two types of companies: those that have been breached and know it, and those that have been breached and don’t know it yet. With this in mind, agencies need a variety of capabilities at their disposal to identify a potential compromise—one being the ability to hunt threats in their environment.

          • An Actionable Federal Response to PII Data Security

            Jan 14, 2015 | Cybersecurity

            In FY13 alone, there were over 25,500 breaches to Personally Identifiable Information (PII) in the Federal Public Sector, according to a recent GAO report, with nearly all agencies surveyed failing to comply with data control laws. Government apps and online support organizations handle vast amounts of PII, such as tax payer data or SSNs, and adoption of digital services is only making security more complex.

          • Who’s On Your Network? Understanding Cloud Security

            Jan 12, 2015 | , Cloud Computing, Cybersecurity

            Data center consolidation initiatives require several layers of security and hypervisor-level protection is critical for context awareness. These software-based solutions can enable rapid and secure workload deployments when properly configured for NIST.

          • A Geospatial Approach to Cyber Situational Awareness

            Nov 13, 2014 | Cybersecurity

            For cybersecurity to become truly effective, organizations need a mechanism to integrate all available data to quickly discover and prioritize cyber threats against their most critical processes and devices. The goal is to increase agility when responding to complex intrusions.

          • Vulnerability Management & Insider Threats from a Government Hacker’s Perspective with Marc Maiffret

            Aug 26, 2014 | Cybersecurity

            Government agencies are confronting a threat landscape which is increasing in complexity and sophistication. Vulnerability assessment tools play a critical role in protecting the network from internal and external threats. Leverage expertise, and learn about advanced vulnerability management capabilities to combat insider threats during this on-demand Webinar.

          • Are You JIE Ready?

            Aug 21, 2014 | Cybersecurity

            Join RedSeal’s Webinar to explore best practices in network analysis and visualization to prepare for JIE.

          • Intel Security Network Defenses for the Department of Energy

            Jul 16, 2014 | Cybersecurity

            As the cyber security landscape changes and advanced malware continues to evolve, more of the focus today is on network vulnerability. Learn more about these network vulnerabilities and discover how this solution can enable your agency today.

          • Advanced Threat Defense: Finding and Mitigating Malware

            Jun 17, 2014 | Cybersecurity

            Join Intel Security's Engineer, Mac Sheehan, for an interactive Webinar addressing the three key requirements to solving today's advanced malware problem: find, fix, and freeze.

          • Take back control – make the network work for you

            Apr 3, 2014 | Cybersecurity

            This on-demand Webinar by Palo Alto Networks and NetScout Systems will show you how to ensure you have the protection and control you need against the latest threats.

          • Continuous Diagnostics & Mitigation: Getting Started

            Mar 20, 2014 | Cybersecurity

            In any comprehensive cyber security program, Continuous Diagnostics and Mitigation (CDM) is the fundamental building block and core practice for satisfying FISMA requirements by agencies and government contractors. CDM facilitates, in real-time or near real-time, insights into the organization’s network health and security situation.

          • Navigate the CDM Process and Preview Upcoming Program Phases

            Mar 18, 2014 | Cybersecurity

            DHS' Continuous Diagnostics and Mitigation (CDM) program is an unprecedented opportunity for agencies to fortify federal computer networks and systems cybersecurity. Recently, John Streufert, DHS Director of Federal Network Resilience and leading voice of the CDM movement, participated in a Webinar with McAfee, a premier government CDM and cyber security solution supplier.

          • Unusual Suspects: Fighting the Invisible Enemy Part II

            Mar 12, 2014 | BigData and Analytics, Business and Operations, Cybersecurity

            This invaluable Webinar series reveals new ways to combat cybercrime using TIBCO StreamBase LiveView®. Utilize a real-time analytics platform with live, streaming data to visualize information in motion and expose cyber criminals. Transform your ability to identify and combat fraudulent activity.

          • Encryption for the Next Generation Endpoint: Webinar for DOD

            Feb 20, 2014 | Cybersecurity

            Join McAfee’s DOD Senior Security Engineer, Nicholas Clark, for an interactive Webinar to review DAR solutions and how they should work in the DOD environment.

        • Download Line Card

          PDF IconClick here to download the Cybersecurity line card in PDF format.