Back to Search Begin New Search Save Search Auto-Notify
Protecting Your Print Environment
In every industry, unprotected network printers are an easy target for cybercriminals. These devices store critical information and integrate with line-of-business systems, yet they often aren’t secured in the same way as laptops, desktops and other IT assets. This live webcast will give IT leaders actionable advice on addressing print security vulnerabilities and improving their overall security posture. It will cover: The benefits of m...
May 15, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
From Risk to Resilience: Leveraging Eve...
Discover the key to operational resilience and gain insights into risk intelligence at our upcoming webinar. Learn how to safeguard your operations, accelerate response times, and protect your workforce against critical events. Severe weather, Terrorism, Civil Unrest, War, OSINT and Physical threats have a crippling effect on the business. Our session will provide a comprehensive overview of strategies to manage risks and maintain continuity,...
May 15, 2024
Organizer: Everbridge Government Team at Carahsoft
Location: Webcast
Add Favorite
Staying Compliant in a Multicloud Environment
With all the benefits that cloud services offer, it’s no wonder that their use is on the rise. However, IT and security professionals raise concerns about the security of data stored on the cloud. Integrated data security solutions are crucial to protecting sensitive data in multicloud environments. But how can you apply the existing technology and services to your organization? In this webinar, you’ll learn how to: Better safeguar...
May 14, 2024
Organizer: Microsoft
Location: Webcast
Add Favorite
The First AI Data Security Platform
Securing data against threats and breaches can be incredibly complex. Legacy data protection programs are strained underneath the weight of complex point products, visibility gaps, alert overload and slow response times to data risks. It’s time for the way you protect data to evolve. Join our launch event to see how Zscaler is harnessing the power of AI and unifying even more protection innovations to usher in the next phase of data security.
May 14, 2024
Organizer: Zscaler
Location: Webcast
Add Favorite
SANS Security West San Diego 2024
Come to San Diego for Serious Cyber Security Training Celebrating 35 Years of Cybersecurity Excellence at SANS Security West 2024 Take the necessary steps to defend your organization from external threats before a breach occurs. Join us in San Diego, CA, for an immersive learning experience from May 9-14 (PT). As cyber threats evolve, so must your skills. This is your chance to learn, network, and advance your career with the industry's foremo...
May 9-14, 2024
Organizer: SANS Institute
Location: San Diego, CA
Add Favorite
Threat Intel and Awareness Summit
This one-of-a-kind summit will provide value to security and compliance practitioners alike. Threat researchers and intelligence analysts from both CrowdStrike and Proofpoint will be covering the threat landscape and, how customers can best address their risk. Understanding the landscape will help customers go “beyond the checkbox” with security awareness and training. Join your Proofpoint and CrowdStrike counterparts for a Better...
May 13, 2024
Organizer: Proofpoint Government Team at Carahsoft
Location: Reston, VA
Add Favorite
ISC2 CCSP® Training Boot Camp
During the CCSP Boot Camp, we deep-dive into all CCSP domains and develop your essential skills and knowledge for the following: Domain 1: Cloud concepts, architecture & design Domain 2: Cloud data security Domain 3: Cloud platform and infrastructure security Domain 4: Cloud application security Domain 5: Cloud security operations Domain 6: Legal, risk and compliance
May 6-10, 2024
Organizer: Infosec
Location: Virtual
Add Favorite
ISC2 CISSP® Training Boot Camp
Get ready for a six-day immersive training experience delivered online, in-person or in team onsite formats. Our expert instructors guide you through the eight domains of the ISC2 CISSP Common Body of Knowledge (CBK), covering all aspects of information security. We ensure you have the tools and resources to master this knowledge effectively. Here’s what you can expect: Training overview: Our industry-leading approach covers all aspects...
May 5-10, 2024
Organizer: Infosec
Location: Virtual
Add Favorite
Securing the Identity Fabric in the Age...
In the realm of government cybersecurity, the Zero Trust framework stands as a beacon of defense against evolving threats. Central to its efficacy are the principles of identity and access management, which redefine traditional security paradigms. Zero Trust advocates for perpetual verification of users, devices, and resources, emphasizing a “never trust, always verify” mantra. Identity verification, facilitated by multifactor auth...
May 9, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Achieving OT Security Maturity: Closing...
While understanding the growing severity of cyber attacks on cyber-physical systems (CPS), many organizations struggle to prioritize and effectively combat the most dangerous threats due to process and technology gaps. Without OT risk management strategies and best practices in place, organizations will continue to face challenges in managing cyber risk to OT and critical infrastructure. In this webinar, OT Security Engineer Keith Walsh and a...
May 8, 2024
Organizer: Claroty
Location: Webcast
Add Favorite
Back to Search Begin New Search