Microsoft Office Offensive Tradecraft
During this webinar attendees will learn about: Recent developments such as Mark-of-the-Web Microsoft security controls including trust settings and decision flows Tactics for gaining initial access, lateral movement, and long-term persistence
Enforce Least Privilege Across Every Endpoint
Almost every cyberattack today involves the exploitation of privileges. Broad privileges and entitlements greatly expand the attack surface and leave your organization extremely vulnerable to security breaches. However, a least-privilege access approach requires that users and programs receive the least amount of permission when required to complete specific tasks. Least privilege is one of the most essential security measures for organizatio...
VETS 2 DPA Training
Who Should Attend: All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how the VETS 2 GWAC can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against the VETS 2 GW...
Migrate, Optimize, and Modernize with V...
Explore the capabilities of VMware Cloud (VMC) on Amazon Web Services (AWS) to facilitate faster and more cost-effective cloud workload migration for your agency. Experience the transformation of applications and infrastructure services using familiar tools and increased scalability. Join us at our upcoming in-person workshop, where subject-matter experts will dive into the following topics: Accelerating datacenter evacuations with VMC on AWS...
Modernizing Security: Simplifying Zero...
Government security teams today are under constant siege. Not only are they responsible for defending their organizations, but they are also tasked with complying with new and in-depth mandates that span Zero Trust, logging and most recently, artificial intelligence (AI). Leading agencies such as Oak Ridge National Laboratory are at the forefront of security innovation modernization. They achieve this by embracing next-generation solutions tha...
DoD: Embracing Continuous Monitoring
Federal cyber leaders are tasked with the challenge of balancing active defense efforts, particularly when the U.S. is involved in international conflict, with building an infrastructure secure from the individual device all the way to enterprise environment. To do all of that, defending their networks and building for the future, DoD leaders must prioritize continuous monitoring of their cyber systems to address hidden vulnerabilities to addr...
May 21, 2024
Organizer:
FedInsider Location:
Webcast
Operational Threat Intelligence Workshop
Is your agency looking for strategic ways to operationalize your threat intelligence data? Join Trellix for an in-person workshop designed to help agencies create a defensible security architecture and leverage threat intelligence for maximum impact. With decades of operational threat intelligence experience, Trellix has a proven track record helping organizations to effectively block threats, respond to incidents, expedite remediation and mea...
Federal Executive Forum Secure Cloud Co...
Cloud technology continues to play an integral role in driving innovation at federal agencies. As use cases become increasingly complex, how can agencies ensure data is secured?
Jack Henry Cybersecurity Forum
Join cybersecurity experts from Jack Henry™ and Rebyc Security as they discuss today’s security challenges and trends impacting you and your valued accountholders. In addition, you’ll have the opportunity to participate in a highly interactive, real-world training exercise designed to help you prepare for today's cyber warfare. Cybersecurity training: In a three-phase, highly interactive session, we’ll simulate a real-w...
Qualys Public Sector Cyber Risk Conference
In the face of escalating attacks spanning broader scope, scale, and attrition, today’s public sector cybersecurity leaders must transition from simple compliance to more comprehensive risk management – while accelerating threat response and mean time to remediation (MTTR). From leveraging artificial intelligence-enabled automation to operationalizing zero trust, from fortifying cloud environments to mitigating supply chain vulnera...
May 21, 2024
Organizer:
Qualys Location:
Washington, DC
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.