Back to Search Begin New Search Save Search Auto-Notify
Comprehensive Disaster Recovery Reduces...
Most K12 school boards forego comprehensive disaster recovery (DR) due to expensive and unpredictable pricing models, putting themselves at risk of a data breach or cyber attack. To help K12 schools mitigate this risk, Stage2Data partnered with Cohesity to offer a fixed-cost DR solution towards substantially lowering cybersecurity policy costs by 30%. In this webinar, attendees will benefit from shared insights on common challenges faced by K1...
April 17, 2024
Organizer: Cohesity Government Team at Carahsoft
Location: Webcast
Add Favorite
Make Progress in Incident Response ...
When Executive Order 14028, “Improving the Nation’s Cybersecurity,” was issued in May 2021, it included directives for agencies to establish several incident response and logging procedures, including sharing information on incident detection and response, by August 2023. In August of that year, the Office of Management and Budget issued Memorandum 21-31 setting specific requirements for agencies to meet, for which the Cybers...
April 17, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
What the SEC Rules Actually Mean to Cyb...
By April 2024, the new SEC rules will have been in place for a few months. It will be a good time to see how the SEC rules have impacted organizations. The rules are written to put CISOs and organizations at risk of enacting inadequate cybersecurity programs or not reporting incidents, creating opportunity for the reporting to put the organization at greater risk. It is time to step back and see what has transpired and what appears to be trans...
April 10, 2024
Organizer: ISACA
Location: Webcast
Add Favorite
Vision 2024: Digital Transformation's G...
Florida is the third-largest state in the U.S. by population, and it continues to grow rapidly – from 2010 to 2020, its population grew by 14.5%. That kind of growth rate might be the envy of other states, but it also means increased pressure on the state government to deliver internet-based, user-friendly services for everything from child support services to renewing business licenses. Bringing digital transformation to the Sunshine St...
April 2, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Unlocking Zero Trust: Maximizing and Ev...
The foundation for successful Zero Trust implementation lies in establishing a trusted data source that spans all devices and networks. Forescout, a longstanding provider of device visibility and control solutions, offers a reliable option that predates the inception of the CDM program. Its track record in serving civilian customers across government sectors underscores its expertise in this domain. Join us on March 27th for a webinar hosted b...
March 27, 2024
Organizer: Forescout Government Team at Carahsoft
Location: Webcast
Add Favorite
Zero Trust: In Depth
Federal departments and agencies are making headway in meeting the requirements of Executive Order 14028, issued in May 2021, to strengthen their cybersecurity by implementing a zero trust architecture. To date, many agencies have made progress in areas like identity management and secure access. But the journey toward achieving a zero trust environment is different for every department. The challenges that civilian agencies must overcome are...
March 26, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Election Security: Protecting the Found...
It has become clear over the past several years that maintaining U.S. election integrity is not just a single agency’s responsibility. Conducting fair and accurate elections is the responsibility of each state and territory. Meanwhile, nation-states, partisans, and scammers can interfere with voter information, try to cast doubt on election outcomes, and spread disinformation across social media, to name just a few. The Office of the Dir...
March 21, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Unlocking Cyber Readiness with SBOMs
The cybersecurity landscape has undergone significant transformations resulting in compliance regulations mandating the adoption of the NIST Secure Software Development Framework framework, with a special emphasis on implementing a Software Bill of Materials (SBOM). In this discussion, we will explore the importance of perceiving cybersecurity as a mission-centric challenge that extends beyond mere compliance checklists. Join us as we discuss...
March 21, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Beyond Reactive: Harness XDR, Threat In...
Don’t wait until threats are at your door. Get hands-on experience using AI and real-world threat-hunting techniques to get control of your attack surface, find out who’s targeting you, and take your SOC from reactive to adaptive. During our Beyond Reactive: Harness XDR, Threat Intel, and AI Virtual Workshop, learn how to build this framework at your organization. Space is limited! Register now and don’t miss the opportunity...
March 20, 2024
Organizer: Trellix
Location: Webcast
Add Favorite
Enabling Resilience & Mobility for the...
As ransomware threats and cyber-attacks in the public sector continue to grow in frequency, severity and sophistication, the solutions used to combat it also need to adapt and improve to meet the needs of organizations. Zerto, a Hewlett Packard Enterprise company, helps state and local entities protect, recover and move their data and applications for continuous availability across on-premises, hybrid and multi-cloud environments. Zerto...
March 19, 2024
Organizer: HPE Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search