37 past events found
Back to Search Begin New Search Save Search Auto-Notify
Take Your Zero Trust Deployment to the...
Cyberthreat prevention technologies are critical to organizations’ defenses, but aren’t sufficient on their own. Hundreds of millions of threats per day threaten organizations, and far too many succeed -- particularly as attacks become more sophisticated and targeted. MITRE Engage is an objective framework that helps organizations bring their defenses to the next level with Active Defense. With Active Defense, security teams use de...
October 5, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Malware & Ransomware Solutions Forum
As organizations continue to deal with emerging threats in the malware space, its easy for some to take a complacent view and say, Malware, haven't we done this already? We've been dealing with this for decades. And while people who take this view aren't necessarily wrong, ransomware continues to be one of the most popular cyber attacks among organizations. With malware and ransomware becoming more sophisticated and threatening than ever befor...
August 20, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Protect Your Data Ecosystem with Zero Trust
With the ability to generate insights, accelerate decision making, and inform policy, data is one of government’s most valuable assets. However, in a world of disparate and decentralized data sources and formats, securing data is a complex challenge that requires looking beyond network perimeters to take an enterprise focus on users, assets and resources. During this digital webcast, Forrester Security and Risk Analyst, guest speaker He...
January 28, 2021
Organizer: Thundercat Technology
Location: Webcast
Add Favorite
Trust Fall: Blueprint for Zero Trust in...
In 2020 there was a growing interest in Zero Trust among Federal Agencies. In fact, 44 federal agencies now have dedicated, funded tiger teams to either research or start implementing zero trust strategically. As agencies accelerate work from home programs and consider Zero Trust, this panel will discuss real world examples and advice to help you create an effective blueprint for implementing zero trust within your environment.Panelists: Steve...
January 12, 2021
Organizer: Public Sector 360
Location: Webcast
Add Favorite
Designing Flexible and Secure Networks...
Software Defined Wide Area Networks (SD-WAN) have been very successful as an enterprise solution in the commercial world, but security concerns and the government’s former emphasis on working in offices has slowed its deployment in the public sector. Now, however, with large parts of the federal workforce working remotely, demand for access to the public internet has dramatically increased. Release of new interim guidance about TIC 3.0 a...
November 5, 2020
Organizer: Public Sector 360
Location: Webcast
Add Favorite
Connecting the Dots to Solve the Case
As DoD, federal agencies and law enforcement work to fill a shortage in key specialties, there is a premium on using the expertise at the highest level. Security analysts often spend too much time collecting and collating data across different public and private sources. Their time would be much better spent analyzing the real threats so they can respond rapidly and effectively. With Forcepoint Data Analyzer, agencies can employ virtual data w...
October 6, 2020
Organizer: Public Sector 360
Location: Webcast
Add Favorite
SANS @MIC Talk - New Tools for Your Thr...
Join Mark Baggett as he discusses new tools and some new features of older tools that enhance your threat hunting capability. This short one hour talk will provide you with the insight you need to begin hunting for Phishing domains and Command and Control channels on your networks. We will discuss the installation and configuration of tools that will have you threat hunting in no time.
August 24, 2020
Organizer: SANS
Location: Webcast
Add Favorite
What’s Your Streaming Data Strategy?
Are you ready to harvest the massive real-time data that your organization generates? Mastering streaming data is critical to gain an edge in business, in every industry. But most businesses still rely on batch and incremental processing. If that’s you, don’t despair. Join this session to understand key concepts, common technologies and best practices you need to succeed with streaming data. You will also learn about the Hitachi Va...
August 4, 2020
Organizer: Hitachi
Location: Webcast
Add Favorite
Genius Machines: AI For Cybersecurity
It’s clear. Cyber will be on the frontlines of future wars. To prepare, the Department of Defense, Intelligence Community and Cyber Command are channeling the power of AI to protect against potential cyber attacks by teaming up to better standardize data collection. During this panel, Nextgov and Defense One will gather tech experts to discuss how battles will be fought by training AI to handle cyber attacks.
June 24, 2020
Organizer: Defense One and Nextgov
Location: Webcast
Add Favorite
How to Stay One Step Ahead of DDoS Threats
Today, cyberattacks around the world are becoming more prevalent and complex. Last year, Akamai successfully defended against a 1.3 Tbps DDoS attack --the largest DDoS outbreak ever recorded. Hackers use DDoS and web application attacks to render IT systems inoperable, steal data, and deface websites which are extremely difficult to defend against. Higher Education institutions are prime targets for these attacks.The introduction of a massive...
December 13, 2018
Organizer: Akamai Gov Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Back to Search Begin New Search