Back to Search Begin New Search Save Search Auto-Notify
Ransomware: Healthcare in the Crosshairs
A recent study by Comparitech revealed that in the last several years, there have been more than 500 successful ransomware attacks impacting nearly 10,000 healthcare providers. It is estimated these attacks have bled the US economy by tens of billions of dollars, but more concerning is the risk to human life. A study by Ponemon, which surveyed 653 IT and IT security practitioners, revealed that 46% noted increased mortality rates and 38% noted...
June 25, 2024
Organizer: Halcyon Government Team at Carahsoft
Location: Webcast
Add Favorite
Demo Desk: Device Patching & Intelligen...
Register for this event and learn how the integration between Forescout and Microsoft can work to overcome today’s challenges such as supporting organizations BYOD (bring your own device) scenarios for hybrid workforces while adhering to zero-trust security principles. Join this webinar to learn how with this integration, security managers can: Achieve a broader understanding of their security posture. Visualize key control metrics. Resp...
June 25, 2024
Organizer: Forescout Government Team at Carahsoft
Location: Webcast
Add Favorite
TechNet Cyber
The harnessing of the right cyber power is more important than ever in a domain deluged by persistent attacks and simultaneous sophisticated campaigns that threaten global political, economic and security interests.A flagship event, AFCEA s TechNet Cyber serves as a center of gravity for a whole-of-government effort to bring together the policy, strategic architecture, operations and C2 along with the joint capabilities needed to meet the glob...
June 25-27, 2024
Organizer: AFCEA International
Location: Baltimore, MD
Add Favorite
Responsible and Transparent Approach to...
The White House Executive Order for New Standards for AI Safety and Security and the Department of Homeland Security’s IT Strategic Plan includes the actions to ensure AI systems are safe, secure, and trustworthy, used responsibly, and address algorithmic discrimination. In this webinar, speakers will delve into the development and training of biometric matching algorithms and steps you can take to mitigate bias. The impact of bias inclu...
June 26, 2024
Organizer: IDGA
Location: Webcast
Add Favorite
Consolidation. Automation. Security. Ju...
Healthcare IT teams of all sizes and experience levels are tasked with enabling medical staff to provide the best possible patient care. However, efficiently supporting a wide variety of medical devices, often shared and mobile, spread across sprawling medical campuses is not easy. It's even more daunting when you consider the increase threat of cyberattacks seeking to steal lucrative patient health information (PHI) or mount a successful...
June 26, 2024
Organizer: NinjaOne Government Team at Carahsoft
Location: Webcast
Add Favorite
Protecting APIs and Sensitive Data
In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems. However, with this increased connectivity comes heightened security risks, particularly concerning the protection of sensitive data in those APIs. One of the most notorious examples of API risk is the Cambridge Analytica scandal in the...
June 26, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Secure Your Multi-Cloud Environment fro...
Security teams today are dealing with endless lists of security issues, but lacking the necessary tools to effectively detect and mitigate the highest risks in their multi-cloud environment. In this session, we will unveil the latest security posture innovations in Microsoft Defender for Cloud, that empower security teams to identify security vulnerabilities spanning from code to cloud, to effectively prioritize the most business-critical risk...
June 26, 2024
Organizer: SANS Institute
Location: Webcast
Add Favorite
Advanced Network Defenses for Today’s F...
The modern enterprise, characterized by hybrid and mobile workforces supported by a hybrid cloud IT environment, brings many security challenges to the federal government, its agencies, entities, and sites. They face multi-faceted cybersecurity concerns due to the sensitive nature of their data, the critical infrastructure, and regulatory mandates involved. The distributed nature of operations, with numerous contractors and providers, introduc...
June 26, 2024
Organizer: SANS Institute
Location: Webcast
Add Favorite
Three Essential Steps to Unlocking Pote...
Join AvePoint Public Sector's webinar to learn how to effectively prepare, secure, and optimize your data for the upcoming availability of Copilot in the GCC for state and local government organizations. The workshop will cover three key steps: ·Preparing Your Data for Copilot: Understand the relationship between Microsoft 365 content and Copilot. Improve your content's quality and relevance for effective Copilot recommendations. ...
June 26, 2024
Organizer: AvePoint Government Team at Carahsoft
Location: Webcast
Add Favorite
Securing Our States: Core Pillars of St...
Forward-thinking state and local governments are participating in the State Risk and Authorization Management Program (StateRAMP) as they build out a robust and secure IT infrastructure. Modeled after the federal government's FedRAMP, the nonprofit membership organization uses independent audits and continuous monitoring to verify that cloud services satisfy standardized state government security requirements and can be used by agencies in mul...
June 26, 2024
Organizer: Route Fifty x The Atlas
Location: Webcast
Add Favorite
Back to Search Begin New Search