Psychological Safety (Online Workshop)
Discover the four stages of psychological safety and the specific behaviors that can help you and your team foster and sustain it. Psychological safety is the belief that one can speak up, take risks, and be oneself without fear of negative consequences. It is essential for high-performing teams, creativity, and learning. But how can you cultivate psychological safety in your organization or team? In this workshop, you will learn about the fou...
April 25, 2024
Organizer:
ICMA Location:
Webcast
Reimagining How Government Agencies Con...
The way government agencies and contractors work continues to evolve. The latest innovations have transformed the way that we work by introducing new ways to engage employees and be productive across different tools and applications. At Zoom, we want to empower you to reimagine how you and your teams connect and collaborate. Join Zoom to hear from the Zoom for Government team as we delve into: streamlining communications, improving productivit...
CTO Sessions: Quantum-Resistant Code Signing
Stateful hash-based signature (HBS) schemes are digital signature schemes believed to be resistant to the threat posed by a cryptographically relevant quantum computer. NSA’s CNSA 2.0 encourages vendors to adopt stateful HBS schemes as defined in SP 800-208 immediately for all software and firmware code signing, with a requirement to support them by 2025. SP 800-208 requires that all stateful HBS key generation and signature algorithms b...
Mandiant Incident Response Services for...
Join us to learn how Google Public Sector & Mandiant approach helping public sector and education organizations reduce their organizational risk in the event of a cyber attack. Our experts will provide an overview of the Mandiant Incident Response Services and how they can help increase confidence in their operations before, during or after a cyber incident. Given the limited budgets and lack of cybersecurity talent, these services can he...
Securely Moving to the Government Cloud
The cloud has changed infrastructure for all organizations and Federal agencies are no exception. However, it’s not as easy as simply “flipping the switch” because there are a myriad of regulatory requirements and considerations to navigate, and it requires careful planning and implementation. Join us on April 25, 2024, at 3:30 ET where SANS analyst Matt Bromiley and Cisco’s Technical Marketing Engineer, Christian Claus...
SANS AI Cybersecurity Forum: Insights f...
The SANS Faculty, experts and practitioners in cybersecurity, have been working to build and enhance the AI-driven cybersecurity landscape. In this forum, you will get a unique opportunity to hear firsthand accounts of how they utilize the power of Artificial Intelligence and Machine Learning to make significant advancements in cybersecurity. Our experienced experts will provide valuable insights, strategies, and practical solutions to help yo...
Do You Know Where Your Data Is
Data can end up in the unlikeliest of places, even for those organizations that have developed formal data governance policies and implemented technical controls to (try to) keep data in central data stores. Especially troublesome is data stored and worked with on user endpoints—workstations, laptops, devices—such as original unstructured files or containing data extracted from structured data sources. With this survey, SANS is see...
The 5 Disruptors of OT Security
Operational technology (OT) environments and industrial control systems (ICS) are becoming increasingly interconnected and complex, expanding the attack surface and necessitating innovative defense mechanisms. To ensure operational resilience and mitigate risk effectively, organizations must continually adapt their OT cybersecurity strategies in response to the rapid advancement of technologies, the evolving nature of cyber threats, and the em...
April 25, 2024
Organizer:
Claroty Location:
Webcast
Securing and Managing Non-Human Identities
Non-human identities are essential components of any organizational landscape, yet their security risks are often underestimated. Just like user accounts, they require constant surveillance and protection. In this webcast, experts dive into the world of non-human identities, including bots, DevOps, certificates, service accounts, API keys, machine identities and more. Join us to: Discover the roles and vulnerabilities of non-human identities L...
AWS Builders Workshop | Amazon Connect 101
Join us for Amazon Connect 101, a 6-hour virtual workshop exploring core concepts related to the provisioning, configuration, and management of Amazon Connect. We’ll cover a slightly technical mix of business and practical applications, such as: Various Amazon Web Services (AWS) that can be leveraged alongside Amazon Connect A sneak peek at new product feature releases for Connect A glimpse into available integration methods to CRM, WFM,...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.