3 webcasts found
+ 46 past events found
Back to Search Begin New Search Save Search Auto-Notify
America Under Cyber Attack: Operating i...
How to Prevent & Manage Supply Chain Risks Last year foreign hackers secretly broke into a US-based IT security solution provider and added infected code into their software. As part of the company’s regular software update process, the company unknowingly forwarded malicious code, creating a backdoor to their clients' IT systems. Multiple government agencies and private organizations were impacted. The breach caught many of the Fede...
Add Favorite
Implementing the New NIST Guidelines fo...
As supply chain complexity continues to grow, so does the need for illumination and regulatory standards. Federal contractors need to be aware of the updated NIST guideline requirements and best practices for implementation.
Add Favorite
Hacks, Threats & Ransoms - What's Next?...
Reduce the risk of security breaches by understanding and protecting what matters most: your critical data. Establishing metadata-driven intelligence and automation to operationalize data protection management helps you discover, classify, analyze, protect, and monitor sensitive data across your organization. Whether your sensitive data is structured, semi-structured or unstructured data in the cloud, on premises, in big data stores, or in rel...
Add Favorite
Back to Search Begin New Search