Back to Search Begin New Search Save Search Auto-Notify
SANS Secure Your Fortress: Cutting-Edge...
Join our expert Cyber Defense Authors/Instructors at SANS Secure Your Fortress! Step into a world where cutting-edge defense meets practicality in cybersecurity! "SANS Secure Your Fortress" will teach you how to master the latest and most effective defense techniques. Whether you're a seasoned expert or just beginning your cyber journey, this event is for you. Big Ideas: Dive into sessions led by industry trailblazers showcasing groundbreaking...
April 1, 2024
Organizer: SANS Institute
Location: Webcast
Add Favorite
Fortifying Election Cybersecurity
As the next round of national and local elections draws closer, election officials are concerned about facing potential cybersecurity threats targeting election networks and systems they support. Blocking these threats can be a daunting challenge for government officials working with limited funds and talent, so they’ll want to implement proactive strategies to harden infrastructure, and implement a holistic approach with world-class inf...
April 2, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
Securing Copilot for Microsoft 365 Education
Join the K12 Security Information eXchange (K12 SIX) and Microsoft for an informational webinar focused on how to increase the security of Copilot for Microsoft 365. With new advancements in AI happening faster than ever before, you might be wondering how you can securely use these tools in your classroom to save educators time and energy. Learn how to secure Copilot for Microsoft 365, an AI companion that helps users save time, differentiate...
April 2, 2024
Organizer: K12 Six
Location: Webcast
Add Favorite
Protecting APIs & Sensitive Data
In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems. However, with this increased connectivity comes heightened security risks, particularly concerning the protection of sensitive data in those APIs. One of the most notorious examples of API risk is the Cambridge Analytica scandal in the...
April 3, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Election Staffing Governance: Securing...
Provisioning identity security for seasonal election workers presents a myriad of challenges for government election boards and commissions. Managing identities across disparate systems and platforms becomes particularly complex due to the temporary nature of election work. Seasonal election workers, including poll clerks and ballot counters, require access to various electoral databases, polling stations, and voting equipment. Coordinating th...
April 4, 2024
Organizer: SailPoint Government Team at Carahsoft
Location: Webcast
Add Favorite
Operationalizing Zero Trust: Securing C...
In the rapidly evolving landscape of cybersecurity, the Zero Trust model has emerged as a cornerstone principle, dictating that trust must never be implicit and must be continually earned. This webinar, “Operationalizing Zero Trust: Securing Containers in Runtime,” delves into the practical applications of Zero Trust architecture within live container workloads, an area fraught with potential vulnerabilities and attack vectors. Joi...
April 4, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Securing CI/CD Pipelines with AWS & GitLab
Government agencies are starting to recognize the impact that Continuous Integration and Continuous Deployment (CI/CD) pipelines from the start, enable rapid and efficient delivery of applications. There is a critical need for automation as support teams can manage agile workflows, it is critical to understand where automation is released within existing tools to safeguard pipelines with automated checks and testing to prevent vulnerabilities...
April 4, 2024
Organizer: GitLab Government Team at Carahsoft
Location: Webcast
Add Favorite
Consolidation and Automation, Not Compl...
Security threats against organizations are constantly evolving, and the emergence of AI is redefining the threat landscape. The sheer number of available security tools can make it difficult for organizations to choose the right ones while ensuring interoperability. To address this challenge, it is increasingly important to prioritize investment and select security tools that work seamlessly to close coverage gaps and maximize visibility. Join...
April 4, 2024
Organizer: World Wide Technology
Location: Webcast
Add Favorite
Protecting Florida's Digital Landscape
When it comes to evaluating your cyber-risk readiness, having an outside perspective can help. Learn from our cybersecurity webinar how to help keep your agency informed, secure, and how to mitigate cyber threats as the hybrid workforce evolves. Discuss industry trends across the cyber landscape How to leverage industry expertise to address the threat landscape Learn to prepare for the growing social engineering threat The Mobile Security ecos...
April 9, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
Maximize IT Efficiency and Protection w...
With the growing flexibility of remote and hybrid work environments, IT professionals face new security challenges. Cloud-based endpoint management solutions can help you manage your organization with greater security, efficiency, and resiliency. Join this webinar to learn how to support your business’s data securely across company-owned and personal devices with Microsoft Intune. Security experts will walk you through an interactive dem...
April 9, 2024
Organizer: Microsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search