Back to Search Begin New Search Save Search Auto-Notify
Empowering Public Sector Cybersecurity:...
The Executive Order on improving the nation's cybersecurity (EO14028) outlines several standards and requirements that government must meet to foster a more secure cyberspace. With endpoint security and event logging unified on a single FedRAMP cloud platform, Elastic and MAD Security effectively address the cybersecurity challenges ready to help agencies meet and exceed EO requirements with an affordable infrastructure model that keeps all ag...
Add Favorite
Strategic Guidance On Solving M-24-04
M-24-04 requires that federal agencies must have a clear understanding of the devices connected within their information systems to gauge cybersecurity risk to their missions and operations. However, with today’s heavily complex environments this action requires a level of expertise and precision that poses its own set of challenges. To that end, Asc3nd Technologies Group, the premier federal partner in IoT and OT security, invites you t...
Add Favorite
Bridge the Gap Between Productivity and...
Remote access use cases have exploded across the government. Unfortunately, security is often not top of mind as these solutions are deployed, whether because they are urgently implemented or stretched for inappropriate use cases. Yet identities and their privileges are at the heart of almost every cyberattack today and remote access software could easily be misused or co-opted. Watch the on-demand recording to understand how BeyondTrust...
Add Favorite
Dragos WorldView Threat Intelligence: P...
In a rapidly evolving and dangerous cyber landscape, threat intel is essential to keep an organization secure. Detecting threats to Industrial Control/Operational Technology (ICS/OT) systems is difficult, which is why Dragos has organized the industry’s largest and most experienced team of ICS cybersecurity practitioners. During this webinar, attendees learned how Dragos WorldView Threat Intelligence arms organizations with in-depth visi...
Add Favorite
Resilience Unleased: The Case for Devel...
During this webinar, attendees got to meet Synack, the premier security testing platform that offers Penetration Testing as a Service (PTaas) on its FedRAMP Moderate Authorized Platform. Synack enables federal, state and local government customers to increase cyber resilience, allowing them to find their most critical vulnerabilities and track improvements over time. During our complementary Synack webinar, attendees learned about: The Case fo...
Add Favorite
Innovations in Cybersecurity Training f...
Cyber workforce development has never been more essential in the public sector space. With cyber threats on the rise, upskilling employees and filling security positions is critical. Per the National Cybersecurity Strategy, updated in 2023, workforce development training is a directive moving forward. During this webinar, attendees: Learned how OffSec’s proven methodology can help improve your security posture Explored new and innovative...
Add Favorite
(IAM) Advantage Unleashed
Attendees of this on-demand webinar learned: Best practices for efficient integration and delivery of identity and security solutions for Zero Trust Architecture Why a best-in-class approach is required to drive real identity security value How to address audit gaps and meet mandated requirements
Add Favorite
The Path to Successful CMMC: Expert Ins...
This virtual discussion featured Matt Travis, CEO of The Cyber AB – the official accreditation body of CMMC – and an expert panel discussing the requirements of CMMC, unpacking the layers and levels of cybersecurity preparedness it demands, and bringing their real-world experience to the table. Invaluable insights into the strategic and tactical steps companies must undertake to navigate their compliance journey successfully were s...
Add Favorite
Understanding the Quantum Cybersecurity...
The quantum computing threat is a clear and imminent danger, having the potential to completely disrupt all secured data, information systems and infrastructure. As we enter the quantum computing era, adopting a post-quantum crypto-agile encryption posture should be one of the top priorities agencies adopt and employ to fortify their proactive stance in cybersecurity. During this webinar, attendees learned about quantum computing power and the...
Add Favorite
Navigating OT Security in the DoD
Attendees of this webinar gained insights on: Current threats that result from converged IT/OT operations Recent OT security legislation and impacts on the DoD The unique use cases for OT security in the DoD Tips and mitigation strategies for managing OT security threats
Add Favorite
Back to Search Begin New Search