Back to Search Begin New Search Save Search Auto-Notify
How to Catch Advanced Persistent Threat...
Join Dr. Richard T. White and Robert D. Long of Tennessee Department of Transportation's Cyber Security Team on how they secure of the Top 5 highway systems in the U.S. against advanced persistent threats (APTs) and ransomware attacks. Richard and Robert will be interviewed by Val Bercovici, CEO and co-founder of Chainkit about the their new architecture and highlights published in their new technical paper: Secure Connectivity for Intelligent...
Add Favorite
Cloud Security Alliance| CCSK Foundation v4.1
The Certificate of Cloud Security Knowledge OnDemand Training program promotes the use of best practices for providing security assurance within Cloud Computing. Intrinsec’s OnDemand CCSK Foundation resources will help you successfully prepare for the Certificate of Cloud Security Knowledge (CCSK) exam. Official CCSK Foundation Student Handbook Over 10 Hours of CCSK Video Content Accessible via your provided student account, you can conv...
Add Favorite
Fraud Beyond the Pandemic: The Role of...
Public sector agencies’ digital strategies were put to the test by the pandemic. With legacy and manual systems pushed to their limits by the new digital age, agency leaders were faced with the unprecedented task of scaling digital solutions which suddenly became the default channel for millions of interactions with the population. Public sector professionals stepped up to the challenge. However, as the effects of the pandemic ease, indi...
Add Favorite
Hands-on Lab Series Part 2: Introductio...
View this on-demand session on conducting end-to-end analysis. To start off, we unpacked how Federal, State, and Local agencies are utilizing data-driven approaches to enhance their operations, including reconciliation, risk assessment, and data deduplication. During this on-demand webinar, you'll go hands-on and learn how to apply these techniques for yourself. You will learn how to bring in and merge different sources of data, ensure data qu...
Add Favorite
Malice, Misuse, & Mistakes: How Organiz...
View this on-demand webinar with Privileged Access Management (PAM) experts from Saviynt as they share best practices and anecdotes from their 20 years of experience in the PAM space. They also demonstrate how Saviynt’s Cloud PAM solution can help mitigate the risks of mistakes, misuse, and malice with just-in-time, seamless, identity-driven privileged access management. During this on-demand webinar, you'll have the opportunity to find...
Add Favorite
Tap into DHS Cyber Grants Funding to St...
The Biden Administration recently issued a statement warning of potential cyberattacks against U.S. organizations, as tensions rise between Russia and the rest of the world. Potential attacks to state and local critical infrastructure would disrupt the lives of millions of Americans, affecting lifeline services such as power, water, healthcare services, and supply chains. State, tribal and municipal government organizations need clear visibili...
Add Favorite
BeyondTrust FSI Roundtable Webinar
The Office of Management and Budget issued its guidance in January on meeting the requirements for agency networks to implement a Zero Trust architecture strategy. The mandate seeks to defend against sophisticated penetrations by adversaries, emphasizing identity management and access controls are key components of the strategies. Taken together, identity and access controls mean that privileged access management (PAM) is essential. Federal ag...
Add Favorite
2022 Red Hat Security Symposium On Demand
Join our on-demand Security Symposium webinar series, where IT security professionals can learn from Red Hat® and Intel security experts, partners, and peers to solve security issues together as a community. This Security Symposium is an on-demand, six-session webinar series with presentations from experts discussing hybrid cloud security challenges that organizations face and solutions to tackle these challenges. During this series, we...
Add Favorite
Ending Phishing Season: How State and L...
Phishing attacks are rising dramatically, particularly those aimed at state and local governments, with recent reports suggesting incidents have nearly doubled. Attacks have targeted a wide swath of the workforce—from revenue and tax officials to employees in elections and unemployment offices.The increased number of phishing incidents have moved beyond email to also target victims through social media, texts and other channels. Regardle...
Add Favorite
The Modern Government: Keyed in on Climate
Central to today’s Modern Government is a focus on building resilience and transformation. As climate change is increasingly seen as a significant risk to the management of infrastructure and the delivery of services, it is also seen, by some, as an opportunity to invest in more sustainable assets. Leaders are starting to focus on developing strategies and prioritizing climate goals that will transform the way we live and work, honing in...
Add Favorite
Back to Search Begin New Search