Securing Tomorrow: The Role of CTFs in...
Join Hack the Box and Carahsoft for an insightful webinar exploring how Capture the Flag (CTF) events serve as a dynamic platform for fostering cybersecurity talent within universities and state/local government agencies.
Defending the Human Layer in the Public...
Human error has long been the preferred weak spot for cybercriminals to attack. As the threat landscape evolves, attacks increase in sophistication, and the attack surface expands, organizations should shift their focus to empowering and securing workforce identities. This will help in addressing immediate risks and foster a proactive culture of security awareness and resilience. These weak spots may come from an unaware employee falling victi...
Accelerate Your Defense Against Modern...
Amid an advancing threat environment, it’s important to provide your clients with comprehensive security. Yet this is easier said than done when a skills shortage makes it hard to find and hire qualified defenders. In this webinar, we’ll look at the challenges IT providers face when up against an escalating SMB threat landscape. We’ll also explore how Blackpoint saves you time, money, and streamlines your operations, all the...
May 7, 2024
Organizer:
Blackpoint Location:
Webcast
Get to Know K12 SIX: Your Partner in K-...
Join the K12 Security Information eXchange (K12 SIX) for an overview of our work, membership benefits, and forthcoming products and events. Since 2016, there have been more than 1,600 publicly disclosed cyber incidents involving U.S. public schools, including ransomware, phishing attacks, and student data breaches. As cyber-attacks against school systems become both more frequent and disruptive, the best way to respond is to collaborate in rea...
May 7, 2024
Organizer:
K12 Six Location:
Webcast
Bedrock Defenses: A Foundational Approa...
The digital landscape is a battleground where cyber threats morph with alarming agility, pushing federal agencies to seek not just any solution, but one that anticipates, adapts, and acts with precision. Enter: Artificial intelligence, a game-changer in cybersecurity offering a strategic advantage against evolving threats. Join GovExec TV to delve into this shift, bringing together government and industry leaders to explore AI’s pivotal...
May 2, 2024
Organizer:
GDIT Location:
Webcast
Advanced Threat Protection for Governme...
In today’s hyperconnected world, where cyber threats evolve rapidly and cyber criminals operate with heightened speed and flexibility, staying ahead of these risks is paramount. Your security teams need to be equally agile and well-prepared. Join ATARC alongside government and industry experts for a comprehensive discussion on the latest threat vectors impacting agency infrastructures. Discover insights into how cloud-native security sol...
May 2, 2024
Organizer:
ATARC Location:
Webcast
Service Branch Spotlight: Navy
Information Warfare is critical in current operations, and its importance continues to grow. Join Defense One as we talk with Naval Information Forces about how they are training sailors, improving cybersecurity, and integrating new technologies—such as unmanned systems and commercial space capabilities—into operations.
Exploring Five Emerging Cybersecurity D...
In the world of cybersecurity defenses, the only constant is change. More than 3,500 cybersecurity vendors are continuously innovating, finding new ways to mitigate risks and secure modern computing environments. Join Steve Piper, Founder & CEO of CyberEdge (and proud CISSP), as he reviews five emerging cybersecurity defenses, including: SaaS security posture management (SSPM) Cloud-native application protection platform (CNAPP) Cloud infr...
May 1, 2024
Organizer:
ISC2 Location:
Webcast
Navigating Intelligence-Driven Cyber Defense
Intelligence-driven cyber defense operations and other similar phrases are commonly heard in industry today, but what is truly meant by this turn of phrase? In this talk, we aim to explore this topic as it relates to the cyber defense landscape and the imperative need for public sector agencies to have access to actionable up-to-date insights on known malicious actors’ tactics, techniques, and procedures (TTPs). This enables network defe...
NISPOM: Practical Guidance on Complianc...
Free and Open to the Public Speaker: Karen Harbaugh | Partner and Government Contracts Practice Lead | Squire Patton Boggs (US) LLP NCBFAA/NEI: 1 CCS/MCS/CES/MES credit Contractors with a facility clearance must continuously ensure their compliance with the National Industrial Security Program (NISP) and the specific requirements in the NISP Operating Manual (NISPOM). Join Squire Patton Boggs partner and government contracts practice lead, Kar...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.