Back to Search Begin New Search Save Search Auto-Notify
Protecting APIs and Sensitive Data
In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems. However, with this increased connectivity comes heightened security risks, particularly concerning the protection of sensitive data in those APIs. One of the most notorious examples of API risk is the Cambridge Analytica scandal in the...
June 26, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Secure Your Multi-Cloud Environment fro...
Security teams today are dealing with endless lists of security issues, but lacking the necessary tools to effectively detect and mitigate the highest risks in their multi-cloud environment. In this session, we will unveil the latest security posture innovations in Microsoft Defender for Cloud, that empower security teams to identify security vulnerabilities spanning from code to cloud, to effectively prioritize the most business-critical risk...
June 26, 2024
Organizer: SANS Institute
Location: Webcast
Add Favorite
Advanced Network Defenses for Today’s F...
The modern enterprise, characterized by hybrid and mobile workforces supported by a hybrid cloud IT environment, brings many security challenges to the federal government, its agencies, entities, and sites. They face multi-faceted cybersecurity concerns due to the sensitive nature of their data, the critical infrastructure, and regulatory mandates involved. The distributed nature of operations, with numerous contractors and providers, introduc...
June 26, 2024
Organizer: SANS Institute
Location: Webcast
Add Favorite
Okta at AWS Summit Washington, DC
Okta is the foundation for secure connections between people and technology. By harnessing the power of the cloud, Okta allows people to access applications on any device at any time, while still enforcing strong security policies. It integrates directly with an organization’s existing directories and identity systems, as well as 4,000+ applications. Because Okta runs on an integrated platform, organizations can implement the service qui...
June 26-27, 2024
Organizer: Okta
Location: Washington, DC
Add Favorite
Haystack CTF: The Hunt for IOC's
Immerse yourself in the world of Intrusion Detection in our new Blue Team game, Haystack. Your mission is to follow the trail of Indicators of Compromise (IOCs) and spot the tell-tale signs of cyber threats. It's a mix of fun, challenge, and learning - an experience you don't want to miss! An up-and-coming hacker prodigy known as Leopold falls into debt with The League after unsuccessfully trying to hack into The League's network to exploit th...
June 27, 2024
Organizer: World Wide Technology
Location: Virtual
Add Favorite
Transforming Workflows for the DoD: Ser...
Join ServiceNow as we dive into the transformative potential of integrating ServiceNow solutions seamlessly with Microsoft 365 (M365) within the secure National Security Cloud on Azure IL5. Designed specifically for the Department of Defense (DoD), this session unveils how these powerful integrations can revolutionize your workflows, collaboration, and security measures. Join us to gain invaluable insights on: Streamlined workflows: Discover...
June 27, 2024
Organizer: ServiceNow Government Team at Carahsoft
Location: Webcast
Add Favorite
Is Access to Corporate Resources from a...
In today's dynamic digital landscape, the need for secure and seamless access to corporate resources from any device, anywhere is paramount. Join SANS Senior Instructor Dave Shackleford and HPE’s Darren Tidwell for an insightful webcast where we dive into the modern threats and security challenges that organizations face, and how innovative solutions like SSE from HPE address these challenges head-on. HPE Aruba Networking SSE securely co...
June 27, 2024
Organizer: SANS Institute
Location: Webcast
Add Favorite
Nextgov/FCW Supply Chain Workshop
Proper supply chain management and national security concerns have never been more interconnected. As geopolitical tensions bring cyber threats to the fore, the public and private sector must collaborate to ensure each link of the supply chain is secure. And everyone in the organization, from developers to senior leadership, must prioritize risk management across the entire threat landscape. Because cybersecurity risks can arise at any point i...
June 27, 2024
Organizer: GovExec
Location: Virtual
Add Favorite
Zero Trust in Action: Approaches to Mob...
In today’s rapidly evolving cybersecurity landscape, Zero Trust has emerged as a critical strategy to defend organizational assets against persistent cyber threats. However, the presence of mobile devices in enterprise environments poses significant challenges to traditional Zero Trust implementations. As government agencies increasingly rely on mobile devices to conduct business and communicate, ensuring the security of these endpoints...
June 27, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
ISC2 CISSP® Training Boot Camp
Get ready for a six-day immersive training experience delivered online, in-person or in team onsite formats. Our expert instructors guide you through the eight domains of the ISC2 CISSP Common Body of Knowledge (CBK), covering all aspects of information security. We ensure you have the tools and resources to master this knowledge effectively. Here’s what you can expect: Training overview: Our industry-leading approach covers all aspects...
July 7-12, 2024
Organizer: Infosec
Location: Virtual
Add Favorite
Back to Search Begin New Search