Back to Search Begin New Search Save Search Auto-Notify
Cybersecurity Leadership and Governance
The goal for this course is to provide an understanding of cybersecurity leadership focused on people and not just technology and policy. It will give you an overview of frameworks to support your risk management activities. It is highly useful to any organizational executive, or leader seeking an understanding of building cybersecurity cultures and governance The word cybersecurity is thrown around, used and abused to scare people into buying...
July 19, 2017
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Cybersecurity Leadership and Governance
The word cybersecurity is thrown around, used and abused to scare people into buying more technology and tools. Yet the most important element of cybersecurity is the leadership of people and creating a culture that supports protecting your business. A study done by IBM noted that 95% of successful cyber-attacks came down to people. This session helps you understand how to structure your basic digital strategy to begin to implement a strong cy...
July 12, 2017
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Cybersecurity Leadership and Governance
The goal for this course is to provide an understanding of cybersecurity leadership focused on people and not just technology and policy. It will give you an overview of frameworks to support your risk management activities. It is highly useful to any organizational executive, or leader seeking an understanding of building cybersecurity cultures and governance The word cybersecurity is thrown around, used and abused to scare people into buying...
June 28, 2017
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Cybersecurity Leadership and Governance
Scope: The goal for this course is to provide an understanding of cybersecurity leadership focused on people and not just technology and policy. It will give you an overview of frameworks to support your risk management activities. It is highly useful to any organizational executive, or leader seeking an understanding of building cybersecurity cultures and governance. Delivery: Live Online Instructor Led Session in a Virtual Classroom Purpose:...
June 21, 2017
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
The Intersection of Cybersecurity and I...
As the cybersecurity challenge has morphed into a multi-front battle -- from the insider in the next cubicle to a distant but malevolent foreign power -- chief information security officers, network operations and security operations center staffs have steadily acquired a variety of tools to counter the threats. This video webinar will explore how agencies can add intelligent automation to the arsenal of techniques they’re using in the f...
June 13, 2017
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Conquer (Un)Predictable Intelligence
The explosion of connectivity and multiplying data sets have opened millions of entry and exit points for data – consequently identifying a breach is about as easy as looking for a needle in a haystack. Hence, advanced analytics and artificial intelligence now stand shoulder to shoulder with our cyber defenders on the thin digital line. So, how are agencies leveraging big data analytics to harden systems without sacrificing performance,...
May 2, 2017
Organizer: MeriTalk
Location: Webcast
Add Favorite
Government Cybersecurity Virtual Summit
Gone are the days when cybersecurity issues were relegated to the back office IT shops. Now security is a part of how all of government works. However, just because maintaining high performing cybersecurity systems is a major priority for all agencies doesn’t mean there aren’t still challenges. Everything from ransomware, to insider threats, to optimizing cyberphysical systems are critical issues for agencies. In order to better un...
March 17, 2017
Organizer: GovLoop
Location: Webcast
Add Favorite
Predictive Intelligence: The Marriage o...
Decision windows are narrowing for agencies faced with combatting fraud, waste and abuse, and cybersecurity threats. The stakes in the cybersecurity wars are rising. Federal agencies – and for that matter nearly all organizations – face attacks from multiple vectors using multiple technical approaches. At the same time, agencies are looking to expand digital services, modernize their infrastructures, and bring more cloud hosting an...
March 8, 2017
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Virtual Session: Top Privacy Issues for...
For decades, information security functions have fought for the responsibility to monitor the flow of information through the organization, in paper and digital formats, throughout its entire life cycle, and to determine the existence and accuracy of data classification. This effort has largely been successful. However, if all data flows through security’s filters, it is incumbent upon security professionals to implement the proper cont...
January 31, 2017
Organizer: RSA Conference
Location: Webcast
Add Favorite
Emerging Cyber Threats in Government
The interconnectivity of global networks has changed the nature of cyber threats. In addition to hactivists intent on mischief, organized criminal groups and nation-state adversaries seek intelligence, financial gain, and government and corporate secrets. Online, the battle rages on with stolen personally identifiable information (PII), ransomware, and the health data from the Internet of Things part of the global landscape. Commercial and gov...
September 15, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search