Back to Search Begin New Search Save Search Auto-Notify
Dell EMC Ransomware & Cyber Recovery Webinar
Protecting Critical Data from a Cyber Attack Date: Tuesday, April 10, 2018Time: 11:00am ET; 8:00am PTDuration: 60 minutesLocation: Online *Register and attend this webinar to receive 1 CPE credit. Once an organization is infiltrated, data is usually compromised within hours. The inability to detect an intruder gives hackers time to not only expose confidential information, but also destroy mission-critical data. Could your organization survive...
April 10, 2018
Organizer: Dell EMC Gov Team at Carahsoft Technology Corp
Location: Webcast
Add Favorite
F5 Government Technology Symposium
Federal Agencies are under ever increasing pressure to meet the Cloud First mandate and still maintain their security and regulatory compliance postures. Complicating matters even further, the 2017 Verizon Data breach report highlighted that 62% of the breaches involved application level hacking, and 81% of the hacking incidents involved weak or stolen passwords. This evolving combination of attack vectors makes cloud based applications a part...
April 3-4, 2018
Organizer: F5 Networks Government Team at Carahsoft
Location: Webcast
Add Favorite
Trust and Resiliency: Storing, Managing...
The federal government collects data on nearly every aspect of life from census and pollutants to finance and geospatial, and everything in between. What used to be measured in megabytes and gigabytes is now petabytes and exabytes – and this growth shows no signs of slowing. Both data center reduction and the need for IT modernization are shaking up the way agencies can adapt to this growth.This webinar will explore technologies and tac...
February 1, 2018
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Breach Notification in the GDPR Era
Most American organizations, and many organizations operating in certain member state jurisdictions in the EU, have been dealing with breach notification for years. It's pretty straightforward. Well, as straightforward as dealing with 50+ different breach notification laws can be. Now, however, with the EU's General Data Protection Regulation, there may be one breach notification law to rule them all. Its requirement for quick turnaround (72 h...
January 25, 2018
Organizer: RSA Conference
Location: Webcast
Add Favorite
Cybersecurity in Today's Department of...
Recent high-profile cybersecurity incidents hitting both the federal government and the private sector show there's a long way to go in the cyber battle. For the U.S. defense sector, the stakes continue to rise as foreign powers and U.S. insiders seek to breach DoD and intelligence community systems. This webinar will feature experts who will discuss what’s ahead for cybersecurity.
November 15, 2017
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Cybersecurity: Protect, Detect, and Respond
Cloud computing, mobile devices, the Internet of Things, and the increasing digitization of information in a hybrid computing environment present new challenges to securing data and information, especially for government agencies. The cyber-threat landscape requires an ongoing and relentless focus on security, especially when considering that many current government security, privacy, and compliance policies were developed in an on-premises on...
October 12, 2017
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Cybersecurity Leadership and Governance
The goal for this course is to provide an understanding of cybersecurity leadership focused on people and not just technology and policy. It will give you an overview of frameworks to support your risk management activities. It is highly useful to any organizational executive, or leader seeking an understanding of building cybersecurity cultures and governance. The word cybersecurity is thrown around, used and abused to scare people into buyin...
August 9-10, 2017
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Cybersecurity Leadership and Governance
The goal for this course is to provide an understanding of cybersecurity leadership focused on people and not just technology and policy. It will give you an overview of frameworks to support your risk management activities. It is highly useful to any organizational executive, or leader seeking an understanding of building cybersecurity cultures and governance. Purpose: The word cybersecurity is thrown around, used and abused to scare people i...
August 2, 2017
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Cybersecurity Leadership and Governance
The goal for this course is to provide an understanding of cybersecurity leadership focused on people and not just technology and policy. It will give you an overview of frameworks to support your risk management activities. It is highly useful to any organizational executive, or leader seeking an understanding of building cybersecurity cultures and governance.The word cybersecurity is thrown around, used and abused to scare people into buying...
July 26, 2017
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Issues in Identity, Credential, and Acc...
Last year, 63% of data breaches involved compromised identities. Traditionally, the Federal government has relied on Common Access Cards (CAC), Personal Identity Verification (PIV), and user name and password systems. As government settles into the “new normal” of mobile, cloud and other nontraditional access points for applications and other resources, these approaches fail to mitigate the risk. We’ll Discuss: Define the pro...
July 26, 2017
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search