Back to Search Begin New Search Save Search Auto-Notify
Secure Schools, Bright Futures: Cyberse...
K-12 institutions are focused on providing continuous, safe, and secure learning environments for students and staff. Despite being resource constrained, school districts must adhere to fundamental cybersecurity practices such as FERPA compliance and ransomware prevention. Join us to learn about the top cybersecurity best practices for K-12 school districts and how Palo Alto Networks approaches these in order to safeguard people and data. In...
January 31, 2024
Organizer: Palo Alto Networks Government Team at Carahsoft
Location: Webcast
Add Favorite
Future-Proofing the Public Sector: Wind...
The phasing out of Windows 10 is a significant transition period for many public sector IT teams. This move coincides with another vital IT transformation moment – the proliferation of generative AI. And, as always, IT leaders have to navigate the evolved cyber threats resulting from these new and exciting cyber abilities. More than ever, staying up to speed with technology means making the right IT investments. Join Government Technolog...
January 30, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
Staying Ahead of Cyber Threats in 2024...
Digital transformation has supercharged both sides of the attack-defense divide. While it can feel as though the odds are stacked against cyber defenders, there are huge opportunities to improve our defenses in the new year with a Zero Trust cybersecurity model. Unlike the “trust but verify model,” zero trust uses “never trust, always verify.” Zero Trust assumes every request is a potential threat and requires full auth...
January 26, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
2024 Predictions Report: Evolution Is t...
The term ‘evolution’ implies the gradual growth of something from simple to complex, and it perfectly sums up Arctic Wolf’s 2024 Cyber Threat Predictions. The predictions presented are based on current cybersecurity trends and insights gathered from our data, and trace the development of several trends based on their earlier, simpler iterations and anticipate which ones are poised to take significant steps forward in the year...
January 16, 2024
Organizer: FutureCon
Location: Webcast
Add Favorite
Understanding FedRAMP Compliance Webinar
Are you familiar with Federal Government programs for protecting controlled unclassified information? There is an increasing emphasis on enforcing the protection of sensitive data by government contractors through cybersecurity compliance programs that require implementation of the Federal Risk and Authorization Management Program (FedRAMP).Companies doing business directly or indirectly with the Department of Defense (DoD) must be aware of th...
November 9, 2023
Organizer: Executive Mosaic LLC
Location: Virtual
Add Favorite
Partnerships in Cybersecurity Education...
Cybersecurity education and workforce development is a significant issue given large current national capability and skills gaps. In this webinar, we bring together key partners and major stakeholders from the public sector, private sector, and academia to discuss pathways of collaboration and partnerships moving forward to solving this important problem. Panel members will discuss their experience and “best practices” to reduce th...
November 7, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
A Look at Evolving Insider Risk Programs
Insider Risk Programs have continued to evolve naturally over the past 20 years. They have grown exponentially beyond the traditional lens of trying to identify spies through cyber-focused data exfiltration events. Today, Insider Risk Programs have expanded to include internal HR, legal, and compliance stakeholders within organizations and have expanded security beyond strictly physical and cyber domains to now include analysts, investigators,...
October 24, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Using Data to Fortify Network Defenses
One Cybersecurity and Infrastructure Security Agency (CISA) program that has been widely adopted throughout the federal government also is one of its longest-established – the Continuous Diagnostics and Mitigation (CDM) program. Introduced in 2012, the program provides a dynamic approach to strengthening the cybersecurity of government networks and systems. The program has evolved over the past decade to add new capabilities, including c...
October 3, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
America's Software Supply Chain: How Se...
The persistence of nation-state actors has introduced a threat to America’s cybersecurity landscape that has never been seen before. Ample countermeasures have been prescribed through various White House, DoD, and CISA guidance that places responsibility on government and private industry to follow these new guidelines for the development of secure software. As we turn the corner toward the close of the federal fiscal year and begin cybe...
August 31, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Identity - One Critical Element of CISA...
When the Cybersecurity and Infrastructure Security Agency (CISA) released its Zero Trust Maturity Model Version 2.0 in April, it identified access management as a core function within the Identity Pillar. Identity is the very first of five such pillars, and brings the need for privileged access management into clear focus. Identity is defined by CISA as “an attribute or set of attributes that uniquely describes an agency user or entity,...
August 22, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search