For the best web experience, please use IE11+, Chrome, Firefox, or Safari

AFCEA TechNet Cyber 2024

We are sorry, the event "AFCEA TechNet Cyber 2024" has already expired.

You may also be interested in.

AI for continuous compliance Automating PAM to meet evolving regulatory demands
White Paper
AI for continuous compliance Automating PAM to meet evolving regulatory demands
AI for continuous compliance Automating PAM to meet evolving regulatory demands
Frameworks like NIS2, DORA, PCI-DSS and HIPAA continuously evolve their standards around organizations’ privileged access management (PAM). Checking boxes is no longer enough – especially when compliance lapses between annual reviews.
Read White Paper
Security compliance as a strategic accelerator to business: How modern PAM reduces delays, friction and access bottlenecks
Online Event
Security compliance as a strategic accelerator to business: How modern PAM reduces delays, friction and access bottlenecks
Security compliance as a strategic accelerator to business: How modern PAM reduces delays, friction and access bottlenecks
“Control” is a favorite word when dealing with privileged access management (PAM) in the cybersecurity sphere. However, without enhancing business value, it can leave you with a highly con
Attend Event
The Guardian at the Gate in your Identity Defenses On Demand
On Demand Webcast
The Guardian at the Gate in your Identity Defenses On Demand
The Guardian at the Gate in your Identity Defenses On Demand
Privileged access management (PAM) remains your strongest defense against both internal and external threats.
Watch Webcast
How AI supercharges PAM for proactive threat prevention
White Paper
How AI supercharges PAM for proactive threat prevention
How AI supercharges PAM for proactive threat prevention
In this new era of identity security, opportunity and risk are in constant battle. The AI once used to secure systems is now being used to hack them. What if AI predicted threat actor’s moves before the chance arose to infiltrate privileged accounts?
Read White Paper
Zero Trust Strategies in Government Progress and Best Practices 2024
On Demand Webcast
Zero Trust Strategies in Government Progress and Best Practices 2024
Zero Trust Strategies in Government Progress and Best Practices 2024
View this on-demand webcast to enhance your agency’s cybersecurity.
Watch Webcast
Now on demand: Quest partner updates for July 2024
On Demand Webcast
Now on demand: Quest partner updates for July 2024
Now on demand: Quest partner updates for July 2024
Watch this Quest partner webinar on demand to get updates on the state of the business, partner feedback, the new Quest partner program structure and more.
Watch Webcast
Navigating NIS 2: Endpoint Management and Identity Security
On Demand Webcast
Navigating NIS 2: Endpoint Management and Identity Security
Navigating NIS 2: Endpoint Management and Identity Security
Join our experts to find out how Quest Software can help you navigate the NIS 2 Compliance Standard - learn tips and tricks and find out how to address the compliance needs of NIS 2.
Watch Webcast
Tackling NHI Threats
White Paper
Tackling NHI Threats
Tackling NHI Threats
Machines, bots, scripts, services and AI agents – known as non-human identities (NHIs) – are now outnumbering humans 50 to 1 in most organizations. Learn about the risks they pose, and what you can do to protect your business.
Read White Paper