Back to Search Begin New Search Save Search Auto-Notify
Showing results for ransomware
Search instead for ransom ware
CyberCast LIVE: Minimizing Ransomware E...
KILL TWO BIRDS WITH ONE STONE:RANSOMWARE & PRIVILEGED ACCESS ABUSE While security awareness programs, regular updates to anti-malware, application whitelists, and data back-up cover your security basics, organizations need to understand that ransomware is just one form of exploit that can easily be replaced by another. According to Forrester, an estimated 80 percent of data breaches are tied to privileged access abuse. By implementing Iden...
May 14, 2020
Organizer: Centrify
Location: Webcast
Add Favorite
Government Continuity: Map for Navigati...
Continuity of Operations Planning (COOP) details government mitigation and planning strategies that create resilience and allow services to continue to be provided in the face of a range of natural disasters. In the face of today’s current health crisis and the sudden increase in remote users, agencies are seeking ways to meet the challenge. A remote workforce — and scores of newly remote devices — requires supplemental off-n...
May 14, 2020
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Strategies for IT Innovation, Data Prot...
Digital Transformation is a major focus for federal, state and local governments today. As the complexity of systems grows, so do the demands to manage, store, and protect information. Scientists at the National Cancer Institute rely on a forward-thinking team of technologists to build an innovative backbone for discovery. Along with IT modernization comes responsibility to ensure that advanced backup and disaster recovery services are in plac...
February 26, 2020
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
San Francisco CyberTalks
San Francisco CyberTalks is the cybersecurity event you can’t afford to miss. For one day, leaders from government, tech and critical infrastructure will come together to discuss the most pressing information security issues that are facing enterprises today.From election security to ransomware to threat intelligence, San Francisco CyberTalks will feature some of the industry’s brightest speakers, engaging the CXO community in disc...
February 24, 2020
Organizer: Scoop News Group
Location: San Francisco, CA
Add Favorite
Hacker Halted 2019 IT Security Conferen...
OH FOR THE SIMPLE DAYS OF PIRACY! Though we like to have fun and play-act like the pirates in “Pirates of the Caribbean” or the Dread pirate Roberts in “The Princess Bride,” in reality, piracy has been troublesome and deadly since the dawn of civilization. Now one pirate, or the group he represents, can cause a billion-dollar data breach, take down an entire municipal government with well-placed ransomware, or weaponize...
October 6-11, 2019
Organizer: EC-Council
Location: Atlanta, GA
Add Favorite
5 Myths of Privileged Access Management...
IT professionals engaged in cloud migration projects are legitimately concerned about security. Their organizations may have deployed a Privileged Access Management (PAM) solution to secure on-premises infrastructure yet worry remains whether legacy PAM can adapt to secure the entire hybrid enterprise. But with information overload it is hard to tell fact from fiction. To help uncover the facts, we’re hosting a webinar on August 29th whe...
August 29, 2019
Organizer: Centrify
Location: Webcast
Add Favorite
Protecting Healthcare Data in Government
Healthcare organizations in government are tasked with managing vital electronic health records while being mindful of HIPAA compliance, defending against ransomware attacks, and cutting costs by moving to the cloud. This webinar will review how government agencies are protecting and managing healthcare data for the individual patient, healthcare clinics and across the enterprise by using effective back-up and recovery tools for disaster prote...
August 21, 2019
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
5 Steps to Minimize Your Exposure to Ra...
Ransomware attacks are dominating the headlines in 2019: City of Baltimore, ASCO Industries, and the Weather Channel are just a few of the examples. Holding someone or something for ransom is a simple yet effective criminal strategy used for thousands of years. Today, cybercriminals are applying these ancient techniques to modern technologies. And according to the FBI’s Internet Crime Complaint Center, the damages associated with ransomw...
July 25, 2019
Organizer: Centrify
Location: Webcast
Add Favorite
Symantec Government Symposium
Cyber sabotage, ransomware, and denial of service attacks are on the rise, while AI, IoT, and cloud are changing the tech landscape. How do we find clarity in this ever-growing complexity? Complex challenges call for bold solutions. Join the best and brightest cyber minds at the 2017 Symantec Government Symposium on December 5 where we’ll tackle these critical issues together. Program to cover: IT MODERNIZATIONand the cloud generation AD...
December 5, 2017
Organizer: Symantec
Location: Washington, DC
Add Favorite
Cocktails and Contracts: Cybersecurity...
If you think you're immune to cybersecurity issues, think again. Go ask Equifax, or ask anyone affected by the "Wanna Cry" ransomware earlier this year, how important is cybersecurity? Join us for cocktails on November 7th as we discuss how cybersecurity affects your government contracting organization. You'll hear several nuggets of inside information and meet the expert members of the KISS - Keep It Simple Solution™ Government Contract...
November 7, 2017
Organizer: Potomac Companies, Inc.
Location: Vienna, VA
Add Favorite
Back to Search Begin New Search