Roadmap to DoDD 8140.03M Compliance: A...
With the release of new DoDD 8140.03M, compliance remains a top concern for agencies. In a dynamic and rapidly changing cyber landscape, it's never been more important to stay ahead of the curve. While it’s no easy task to navigate, early implementation and strategic planning are critical to the nation’s security. WillCo Tech offers trusted cybersecurity expertise management, equipping the DoD workforce with the largest cybersecuri...
Bedrock Defenses: A Foundational Approa...
The digital landscape is a battleground where cyber threats morph with alarming agility, pushing federal agencies to seek not just any solution, but one that anticipates, adapts, and acts with precision. Enter: Artificial intelligence, a game-changer in cybersecurity offering a strategic advantage against evolving threats. Join GovExec TV to delve into this shift, bringing together government and industry leaders to explore AI’s pivotal...
May 2, 2024
Organizer:
GDIT Location:
Webcast
Quantum Readiness: Effective Strategies...
Quantum Computers pose an existential threat to data encryption. In addition, adversaries are already capturing sensitive network traffic for Store Now, Decrypt Later (SNDL) attacks. For this reason, the Quantum Computing Cybersecurity Preparedness Act (H.R. 7535) requires federal agencies to prepare now to protect National Security Systems. Specifically, government agencies must maintain an inventory of all information technology in use that...
We Know Your Passwords (Do You?) - Free...
Is your organization a sitting duck for cyberattacks? You might be surprised to learn just how vulnerable your company's data could be. This webinar will pull no punches: we'll expose the alarming truth about password security in today's digital threat landscape. Here's what you'll uncover: Shocking statistics: We'll dive deep into the data on password breaches and cyberattacks, revealing the true scope of the problem. Current Threats: Learn a...
Advanced Threat Protection for Governme...
In today’s hyperconnected world, where cyber threats evolve rapidly and cyber criminals operate with heightened speed and flexibility, staying ahead of these risks is paramount. Your security teams need to be equally agile and well-prepared. Join ATARC alongside government and industry experts for a comprehensive discussion on the latest threat vectors impacting agency infrastructures. Discover insights into how cloud-native security sol...
May 2, 2024
Organizer:
ATARC Location:
Webcast
Reduce Risk, Enhance Response: Ransomwa...
Every year, ransomware continues to be a persistent and evolving threat in the realm of cybersecurity. As technology advances, ransomware adapts, making it essential for state and local government to stay vigilant and implement robust security measures. The impacts of ransomware extend beyond financial losses, encompassing data breaches, reputational damage, and operational disruptions. Defending your agency against these threats requires pro...
Service Branch Spotlight: Navy
Information Warfare is critical in current operations, and its importance continues to grow. Join Defense One as we talk with Naval Information Forces about how they are training sailors, improving cybersecurity, and integrating new technologies—such as unmanned systems and commercial space capabilities—into operations.
Defending the Human Layer in the Public...
Human error has long been the preferred weak spot for cybercriminals to attack. As the threat landscape evolves, attacks increase in sophistication, and the attack surface expands, organizations should shift their focus to empowering and securing workforce identities. This will help in addressing immediate risks and foster a proactive culture of security awareness and resilience. These weak spots may come from an unaware employee falling victi...
Accelerate Your Defense Against Modern...
Amid an advancing threat environment, it’s important to provide your clients with comprehensive security. Yet this is easier said than done when a skills shortage makes it hard to find and hire qualified defenders. In this webinar, we’ll look at the challenges IT providers face when up against an escalating SMB threat landscape. We’ll also explore how Blackpoint saves you time, money, and streamlines your operations, all the...
May 7, 2024
Organizer:
Blackpoint Location:
Webcast
Get to Know K12 SIX: Your Partner in K-...
Join the K12 Security Information eXchange (K12 SIX) for an overview of our work, membership benefits, and forthcoming products and events. Since 2016, there have been more than 1,600 publicly disclosed cyber incidents involving U.S. public schools, including ransomware, phishing attacks, and student data breaches. As cyber-attacks against school systems become both more frequent and disruptive, the best way to respond is to collaborate in rea...
May 7, 2024
Organizer:
K12 Six Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.