How to Leverage AI to Optimize Your SOC...
Security Operations Centers struggle to keep pace with modern cybersecurity threat requirements. The volume and speed of threats (IOCs and IOAs) are well beyond the processing capabilities of even experienced security analysts, and this constraint doesn’t factor in the cost of these systems, which are expensive to buy, integrate and maintain. In this webinar, Tracy Williams from Anomali will discuss the application of innovative AI techn...
What You Need to Know about the NIS II...
Come and learn from ENISA, the European Union's Agency for Cybersecurity), about the NIS2, the EU's cybersecurity legislation, which will come into force this year across all the EU's critical sectors. This seminar will help you get ready for the NIS2 incident reporting and security measures requirements, what NIS2 will mean for organizations doing business in the European Union, and what skills you may need to implement the NIS2. This online...
Conquer Any Cybersecurity Challenge: Th...
The public sector faces unique challenges around enhancing security and streamlining operations – and it can be difficult to address these issues due to resource constraints, increasingly complex environments, a rise in cyberattacks and data overload. Luckily, emerging technologies are helping to change this. Explore the tools that can help organizations improve attack surface visibility, automate repetitive manual tasks and provide anal...
Metrics that Matter for Critical Infras...
Critical infrastructure services in North America face accelerating threats from both nation-states and other sophisticated threat actors. Governments globally are grappling with how to best balance incentives, support, and direct oversight. Meanwhile, critical infrastructure owners and operators face significant challenges with technology, staff resources, and expertise to better manage cyber resilience. For instance, the healthcare industry...
April 23, 2024
Organizer:
FedInsider Location:
Webcast
Seal the Cracks: Strategic Supply Chain...
Join Archer and Carahsoft for a crucial webinar addressing the escalating challenges posed by supply chain cybersecurity risks in government networks. This webinar will delve into: Understanding common supply chain and third-party risks. Proactively addressing and mitigating supply chain attacks to bolster organizational defenses. Leveraging NIST 800-171 best practices to fortify software supply chains against vulnerabilities. Exploring NIST N...
Secure Your Workforce with Phishing-Res...
Phishing continues to be a prevalent threat, with organizations falling victim to credential-based attacks, resulting in costly breaches. Traditional multi-factor authentication (MFA) methods are vulnerable to phishing attacks. Discover the journey Okta customers are taking towards phishing-resistant authentication in this insightful webinar. Join our webinar to explore: The key features of phishing-resistant authenticators Strategies to defen...
April 24, 2024
Organizer:
Okta Location:
Webcast
SANS AI Cybersecurity Forum: Insights f...
The SANS Faculty, experts and practitioners in cybersecurity, have been working to build and enhance the AI-driven cybersecurity landscape. In this forum, you will get a unique opportunity to hear firsthand accounts of how they utilize the power of Artificial Intelligence and Machine Learning to make significant advancements in cybersecurity. Our experienced experts will provide valuable insights, strategies, and practical solutions to help yo...
Unlocking Comprehensive Protection thro...
State and local agencies are top targets for cybercriminals, with data breaches costing millions per incident. Learn how to safeguard your data and save money with Symantec Endpoint Security Complete (SESC). In this webinar, you will: Discover how SESC secures all your endpoints, minimizing the risk of cyberattacks Dive into innovative approaches to optimize endpoint protection and adapt to evolving threats Learn how SESC's user-friendly i...
Navigating the Evolving Threat Landscape
Join our cybersecurity experts as they unveil critical insights from the highly anticipated 2024 MSP Threat Report, including the implications of Windows Server 2012’s end-of-life, the evolution of cyberattack techniques and ransomware threats, and innovative strategies to reshape your cybersecurity operations. In this webinar, you will gain a better understanding of the impact of these developments on managed service providers (MSPs) an...
April 25, 2024
Organizer:
Connectwise Location:
Webcast
NIST CSF 2.0 - A Playbook for Supply Ch...
Digital supply chains are complex and critical systems. In a rapidly evolving cyber landscape, supply chain security remains a top concern for organizations looking to solidify their protection strategies. Many organizations look to NIST for direction when setting their cybersecurity strategy. The new version of the Cybersecurity Framework (CSF 2.0) has recently been released and provides best practices to help navigate the evolving threat lan...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.