Get to Know K12 SIX: Your Partner in K-...
Join the K12 Security Information eXchange (K12 SIX) for an overview of our work, membership benefits, and forthcoming products and events. Since 2016, there have been more than 1,600 publicly disclosed cyber incidents involving U.S. public schools, including ransomware, phishing attacks, and student data breaches. As cyber-attacks against school systems become both more frequent and disruptive, the best way to respond is to collaborate in rea...
May 7, 2024
Organizer:
K12 Six Location:
Webcast
Bedrock Defenses: A Foundational Approa...
The digital landscape is a battleground where cyber threats morph with alarming agility, pushing federal agencies to seek not just any solution, but one that anticipates, adapts, and acts with precision. Enter: Artificial intelligence, a game-changer in cybersecurity offering a strategic advantage against evolving threats. Join GovExec TV to delve into this shift, bringing together government and industry leaders to explore AI’s pivotal...
May 2, 2024
Organizer:
GDIT Location:
Webcast
Advanced Threat Protection for Governme...
In today’s hyperconnected world, where cyber threats evolve rapidly and cyber criminals operate with heightened speed and flexibility, staying ahead of these risks is paramount. Your security teams need to be equally agile and well-prepared. Join ATARC alongside government and industry experts for a comprehensive discussion on the latest threat vectors impacting agency infrastructures. Discover insights into how cloud-native security sol...
May 2, 2024
Organizer:
ATARC Location:
Webcast
Service Branch Spotlight: Navy
Information Warfare is critical in current operations, and its importance continues to grow. Join Defense One as we talk with Naval Information Forces about how they are training sailors, improving cybersecurity, and integrating new technologies—such as unmanned systems and commercial space capabilities—into operations.
Exploring Five Emerging Cybersecurity D...
In the world of cybersecurity defenses, the only constant is change. More than 3,500 cybersecurity vendors are continuously innovating, finding new ways to mitigate risks and secure modern computing environments. Join Steve Piper, Founder & CEO of CyberEdge (and proud CISSP), as he reviews five emerging cybersecurity defenses, including: SaaS security posture management (SSPM) Cloud-native application protection platform (CNAPP) Cloud infr...
May 1, 2024
Organizer:
ISC2 Location:
Webcast
Navigating Intelligence-Driven Cyber Defense
Intelligence-driven cyber defense operations and other similar phrases are commonly heard in industry today, but what is truly meant by this turn of phrase? In this talk, we aim to explore this topic as it relates to the cyber defense landscape and the imperative need for public sector agencies to have access to actionable up-to-date insights on known malicious actors’ tactics, techniques, and procedures (TTPs). This enables network defe...
NISPOM: Practical Guidance on Complianc...
Free and Open to the Public Speaker: Karen Harbaugh | Partner and Government Contracts Practice Lead | Squire Patton Boggs (US) LLP NCBFAA/NEI: 1 CCS/MCS/CES/MES credit Contractors with a facility clearance must continuously ensure their compliance with the National Industrial Security Program (NISP) and the specific requirements in the NISP Operating Manual (NISPOM). Join Squire Patton Boggs partner and government contracts practice lead, Kar...
Unveiling the Cyber Pandora's Box
Today's digital battlegrounds witness a critical convergence of cybersecurity assaults driven by artificial intelligence alongside formidable adversaries. Join us for an engaging discussion led by industry experts, as they impart invaluable insights into harnessing threat intelligence to proactively combat the evolving cyber threats propelled by AI technology. Our esteemed panelists will delve into strategies to bolster your organization's def...
April 30, 2024
Organizer:
Trellix Location:
Webcast
Automate, Analyze, Act: Streamlining Yo...
Join Elastic and the Arizona Department of Homeland Security (AZDOHS) to learn how their agency is leveraging Elastic to combat evolving threats. Elastic provides a centralized security information and event management (SIEM) platform and log aggregation, offering real-time visibility for improved cybersecurity and threat detection. With Elastic, organizations of all sizes can streamline log analysis, prioritize alerts based on threat relevanc...
Achieving Zero-Trust Architecture: Cult...
The implementation of zero-trust architecture (ZTA) requires a fundamental cultural change among and within different government agencies. “Never trust … Always verify” is a profound pivot from the current mindset inside the federal government. Unfortunately, as is well documented, the public sector accepts change slowly, which is a problem in this era of rapid technological change. Notably, adversaries of the United States...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.