Back to Search Begin New Search Save Search Auto-Notify
Protecting the 2024 Election: Be Prepar...
After the events of the past few years, security is in the forefront of election officials’ minds. The individual states are responsible for conducting elections, so the National Association of Counties (NACo) at its annual legislative conference just conducted a series of workshops and panels on the range of threats facing election workers and voters alike. While physical threats, intimidation and harassment are primary concerns, there...
Add Favorite
Dragos WorldView Threat Intelligence: P...
In a rapidly evolving and dangerous cyber landscape, threat intel is essential to keep an organization secure. Detecting threats to Industrial Control/Operational Technology (ICS/OT) systems is difficult, which is why Dragos has organized the industry’s largest and most experienced team of ICS cybersecurity practitioners. During this webinar, attendees learned how Dragos WorldView Threat Intelligence arms organizations with in-depth visi...
Add Favorite
(IAM) Advantage Unleashed
Attendees of this on-demand webinar learned: Best practices for efficient integration and delivery of identity and security solutions for Zero Trust Architecture Why a best-in-class approach is required to drive real identity security value How to address audit gaps and meet mandated requirements
Add Favorite
The Path to Successful CMMC: Expert Ins...
This virtual discussion featured Matt Travis, CEO of The Cyber AB – the official accreditation body of CMMC – and an expert panel discussing the requirements of CMMC, unpacking the layers and levels of cybersecurity preparedness it demands, and bringing their real-world experience to the table. Invaluable insights into the strategic and tactical steps companies must undertake to navigate their compliance journey successfully were s...
Add Favorite
Navigating OT Security in the DoD
Attendees of this webinar gained insights on: Current threats that result from converged IT/OT operations Recent OT security legislation and impacts on the DoD The unique use cases for OT security in the DoD Tips and mitigation strategies for managing OT security threats
Add Favorite
Mapping to DoD Zero Trust Capabilities:...
In this on-demand webinar, attendees learned: How to meet Network, Orchestration/Automation and Visibility/Analytics requirements How to manage encrypted data The importance of Lateral or East-West visibility in Zero Trust
Add Favorite
Navigating Cybersecurity in the Defense...
Attendees joined Quzara and Carahsoft on April 25, 2024 for a critical discussion on the evolving threat landscape, practical defense strategies, and the intricate web of regulatory compliance shaping the future of defense cybersecurity. Attendees experienced: Expert Insights: Attendees heard from a distinguished panel, including voices from Microsoft's Defense and Aerospace teams and the DOD DC3 Crime Center. Real-World Solutions: Attendees d...
Add Favorite
Forescout Webinar: Building Cyber Resil...
The rising use of Industrial IoT devices in critical infrastructure networks increases risks by connecting OT and IT systems, making critical processes more vulnerable. Lack of visibility into OT networks hinders OT organizations from assessing breach impacts on IT networks, leading to costly shutdowns. Fortunately, eyeInspect is now free for anyone in the DOD through Comply-to-Connect (C2C). In this User group webinar hosted by Carahsoft wher...
Add Favorite
Roadmap to DoDD 8140.03M Compliance: A...
With the release of new DoDD 8140.03M, compliance remains a top concern for agencies. In a dynamic and rapidly changing cyber landscape, it's never been more important to stay ahead of the curve. While it’s no easy task to navigate, early implementation and strategic planning are critical to the nation’s security. WillCo Tech offers trusted cybersecurity expertise management, equipping the DoD workforce with the largest cybersecuri...
Add Favorite
Back to Search Begin New Search