32 past events found
+ 2 upcoming events found
Back to Search Begin New Search Save Search Auto-Notify
Visibility, Control, Security: CrowdStr...
State and local government organizations are being targeted by threat actors more than ever. During this webinar, we will discuss how CrowdStrike is maintaining the trust of citizens, staying ahead of your adversaries, and securing digital government. Join CrowdStrike's Debbi Blyth, Executive Strategist, and Chuck Hankle, Security Solution Architect, to discuss how they are responding to the evolving Cloud and Identity Security challenges face...
August 29, 2023
Organizer: TD Synnex | CrowdStrike
Location: Webcast
Add Favorite
Securing the Federal Software Supply Chain
Things are coming to a head within the federal supply chain (and, frankly, every other supply chain) as cyber-attacks become increasingly more common and sophisticated. Join SteelCloud’s COO, Brian Hajost, and TD Synnex Public Sector's Chief Cyber Security Technologist, Don Maclean, as they discuss how to strategize your cyber response: Explore EO 10428, which calls for bold changes to cybersecurity Learn about SBOMs (software bill of m...
June 1, 2023
Organizer: TD Synnex Public Sector
Location: Webcast
Add Favorite
CrowdStrike Coffee Chat Live Coaching:...
The Department of Defense Enterprise Software Initiative (ESI) program is designed to offer DoD customers with discounts based off of GSA Schedule Contract pricing through negotiated Blanket Purchase Agreements (BPA). All awarded ESI BPA’s are the Department of Defenses preferred method of IT procurement in accordance with the Defense Federal Acquisition Regulation Supplement (DFARS) Section 208.74. Software product category of Informati...
April 6, 2023
Organizer: DLT | CrowdStrike
Location: Webcast
Add Favorite
CrowdStrike Coffee Chat Live Coaching:...
Information Technology Enterprise Solutions – Software 2 (ITES-SW2) is a $13 billion firm-fixed price, indefinite delivery/indefinite quantity (IDIQ) contract vehicle. The purpose of the ITES-SW2 acquisition is to support Army, Department of Defense (DoD) and all Federal Agency enterprise Information Technology (IT) infrastructure and info-structure goals by leveraging commercially available off the shelf (COTS) software products and mai...
December 1, 2022
Organizer: DLT | CrowdStrike
Location: Webcast
Add Favorite
CBOM: Automating Zero-Defect Compliance...
Register for a Free Lunch & Learn Webinar on CBOM: Automating Zero-Defect Compliance at Scale. In today’s complex digital technology landscape there is an ever-evolving threat that requires securing and protecting critical infrastructure, information, and assets. Several initiatives are under way throughout the Government to support the presidential Executive Order on Improving the Nation’s Cybersecurity which includes implemen...
November 17, 2022
Organizer: TD Synnex Public Sector
Location: Virtual
Add Favorite
CrowdStrike Adversary Universe World Tour
Take your organization’s defenses to the next level with an adversary-led approach to security Join our intelligence and security experts, along with your peers, to learn about the world’s most active and disruptive threat actors, their evolving tactics and techniques, and the latest adversary campaigns — all prevented by the power of the CrowdStrike Falcon® platform. Ultimately, learn what you need to know — and do...
August 23, 2022
Organizer: DLT | Crowdstrike
Location: Nashville, TN
Add Favorite
"Cyber & Cigars" Fireside Chat - How Se...
Join GuidePoint Security, BeyondTrust, and CrowdStrike for an in-person "Cyber & Cigars" fireside chat to hear experts discuss the risks and challenges of privileged access in network environments and the importance of securing and protecting endpoints from external and internal malicious attacks. You will hear from GuidePoint’s Federal CTO, Jean-Paul Bergeaux, and CrowdStrike and Beyond Trust experts. Q&A and networking to follo...
July 28, 2022
Organizer: DLT Solutions | Crowdstrike
Location: Fayetteville, NC
Add Favorite
Zero Trust and the Power of Isolation f...
With the growing threat of cyber attacks, DHS’s Cybersecurity and Infrastructure Agency (CISA) and the White House have recently released guidelines for agencies to adopt a Zero Trust approach to cybersecurity. Isolation is paramount to Zero Trust Architecture. Isolation creates a virtual "air gap" between the network end user and the online world. Instead of opening a website directly, the end user sees a sanitized version of it with al...
April 13, 2022
Organizer: DLT Solutions | Menlo Security
Location: Webcast
Add Favorite
eCrime Social Engineering Operations
eCrime actors have continually sought to capitalize on current events, human emotion, and sensitive data to manipulate real human behaviors as part of a cyber attack. This brief will cover the necessary circumstances and infrastructure used in recent social engineering techniques to lure past victims – including public sector and educational institutions – into providing information or performing actions that support financially-mo...
November 9, 2021
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Nation-State Threat Landscape Overview: Iran
Join CrowdStrike for a deep dive into the nation-state threat landscape of Iran. Jason Rivera, Global Director - Strategic Threat Advisory Group at CrowdStrike, will give a brief on the broader geopolitical context for the latest Iranian cyber activities, an overview of the primary threat actors responsible for Iranian offensive cyber operations, and these actors’ TTPs (tactics, techniques, and procedures). He will also share mitigation...
January 13, 2021
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Back to Search Begin New Search