17 webcasts found
+ 38 past events found
Back to Search Begin New Search Save Search Auto-Notify
Creating a Cybersecurity Professional D...
Cybersecurity is a diverse and technically complex profession. Security monitoring, intrusion detection, project management, education, and awareness are just a few skills vital to the modern cybersecurity team. Leaders are struggling to recruit and retain professionals with these critical skills in a market with dramatically increasing demand for talent. This poses a real threat to the continued operation of cybersecurity teams that require c...
Add Favorite
Top 5 Security Challenges in Cloud Migration
Security tools are often incompatible or simply not optimized for the cloud or deployment processes. This means that security ends up causing high overhead due to multiple environments requiring unique tools, thus hindering your ability to streamline operations. Security tools may work well in one cloud environment but are too inflexible for the needs of a hybrid cloud. Agencies need adaptable security tools that fit anywhere they build, from...
Add Favorite
Dcode Virtual: Improving Cyber Posture...
The coronavirus outbreak emphasizes the need to bring the best emerging tech solutions into the government as adversaries have already shown that they are using this vulnerable time to attack the U.S. government. Join Dcode’s cyber expert Lauren Strayhorn to discuss these challenges and some of the best solutions to keep infrastructure secure, even while teleworking.
Add Favorite
Official (ISC)2 CISSP OnDemand | Certif...
The Official (ISC)² CISSP OnDemand is a self-paced learning solution that covers the 6 domains of the CISSP Common Body of Knowledge (CBK) in order to study for the CCSP examination. Delivered in a modular format, including 28.5 hours of HD video content accessible via any web-enabled device at any time- as often as you want. This CISSP OnDemand allows students to learn at their own pace, spend extra time on material where needed and rei...
Add Favorite
Improve Your Compliance Posture with Id...
Many modern hybrid enterprises and government agencies are struggling to ensure they have security controls everywhere necessary as well as being able to prove their effectiveness, especially with so many shared privileged accounts. Ever-changing industry as well as government regulations make it difficult to get and stay compliant. In order to reassure customers and the public that confidential data such as credit cards and health records are...
Add Favorite
CyberCast: Secure Remote Access for Adm...
YOU’VE SECURED THE WORKFORCE, NOW SECURE PRIVILEGED ACCESS. Current work-from-home requirements have resulted in organizations enabling entire workforces for remote access. As the FBI and other agencies report, this is a boon for cyber attackers who see this expanded attack surface as a feeding frenzy opportunity. Organizations of all sizes are at increased risk and need to secure remote access for privileged users, whose identities can...
Add Favorite
Facing Insider Threats: Early Lessons L...
Facing Insider Threats The SolarWinds Hack and response is creating new cyber security science and awareness of survivorship bias. Since Dec 13th, 2020 DHS/CISA has issued elaborate, regularly updated guidance to all government agencies and private sector organizations on how to respond, contain, recover and mitigate unprecedented and immeasurable insider data breach risk posed by the Russian Intelligence APT29 group. To address newly discover...
Add Favorite
How to Catch Advanced Persistent Threat...
Join Dr. Richard T. White and Robert D. Long of Tennessee Department of Transportation's Cyber Security Team on how they secure of the Top 5 highway systems in the U.S. against advanced persistent threats (APTs) and ransomware attacks. Richard and Robert will be interviewed by Val Bercovici, CEO and co-founder of Chainkit about the their new architecture and highlights published in their new technical paper: Secure Connectivity for Intelligent...
Add Favorite
Building a Cloud Security Culture - Mer...
To innovate faster, you need the right tools to unlock the ability to adapt and scale quickly. Most importantly, you need the right security levels to get there. Throughout this course, we’ll talk about the benefits and capabilities of DevOps, as well as how to appropriately integrate security into DevOps to fuel innovation. We’ll complete the course by featuring the baked-in security controls available on AWS and highlight the key...
Add Favorite
Cloud Security Alliance| CCSK Foundation v4.1
The Certificate of Cloud Security Knowledge OnDemand Training program promotes the use of best practices for providing security assurance within Cloud Computing. Intrinsec’s OnDemand CCSK Foundation resources will help you successfully prepare for the Certificate of Cloud Security Knowledge (CCSK) exam. Official CCSK Foundation Student Handbook Over 10 Hours of CCSK Video Content Accessible via your provided student account, you can conv...
Add Favorite
Back to Search Begin New Search